Everything I Needed to Know about Network Security I Learned at the Tower of London
William Hugh Murray - CISSP
Sep 27, 2000
AbstractRecent events have demonstrated the fundamental vulnerabilities of the Internet, the limitations and shortcomings of our defensive strategies. It is becoming increasingly clear that we will not succeed in securing the network by patching Unix. While it is urgent that we respond, many of us seem to be running out of options; we have done what we know how to do and it is not working.
This presentation will revisit fundamental tactics such as perimeter defenses, bastions, firewalls, layering, man-traps, alarms and others. It will use the Tower of London to illustrate these tactics and to show how to integrate them into a coherent and reliable strategy.
About the SpeakerBill Murray is information system security consultant to Deloitte & Touche. He has more than forty years experience in information technology and more than thirty in security. He is a Certified Information System Security Professional.
During more than twenty-five years with IBM his management responsibilities included development of access control programs, advising IBM customers on security, and the articulation of the security product plan.
In 1987 he received the Fitzgerald Memorial Award for leadership in data security. In 1989 he received the Joseph J. Wasserman Award for contributions to security, audit and control.
Mr. Murray holds the Bachelor of Science degree in Business Administration from Louisiana State University, and is a graduate of the Jesuit Preparatory High School of New Orleans.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.