Trust is the root of security.
Trust defines the relationship in which two or more network entities are allowed to communicate. Security policy decisions are based on trust.
Trusted entities are allowed to communicate freely; communication with untrusted entities needs to be carefully managed and controlled because of its higher risk.
KEY Trust and risk are opposites; security is used to limit risk by enforcing limitations on trust po|NT relationships.
Trust relationships might be explicitly defined or informally implied. Trust relationships can be inherited—for example, if a user is granted certain privileges on one system, another similar system might extend the same privileges. However granted, trust and privileges are sometimes abused.
Was this article helpful?