Trust

Trust is the root of security.

KEY POINT

Trust defines the relationship in which two or more network entities are allowed to communicate. Security policy decisions are based on trust.

Trusted entities are allowed to communicate freely; communication with untrusted entities needs to be carefully managed and controlled because of its higher risk.

KEY Trust and risk are opposites; security is used to limit risk by enforcing limitations on trust po|NT relationships.

Trust relationships might be explicitly defined or informally implied. Trust relationships can be inherited—for example, if a user is granted certain privileges on one system, another similar system might extend the same privileges. However granted, trust and privileges are sometimes abused.

Was this article helpful?

0 0
Project Management Made Easy

Project Management Made Easy

What you need to know about… Project Management Made Easy! Project management consists of more than just a large building project and can encompass small projects as well. No matter what the size of your project, you need to have some sort of project management. How you manage your project has everything to do with its outcome.

Get My Free Ebook


Post a comment