6
zDesign and architectural considerations
y“Human error” is usually scapegoating – the problem usually is management, or operational, or design
yCurrent authentication methods are lame
yThe “defensive perimeter” approach, while not totally useless, falls way short – there must be mutual suspicion within the perimeter