zDesign
and architectural considerations
y“Human error” is usually
scapegoating – the problem usually is management, or
operational, or design
yCurrent
authentication methods are lame
yThe
“defensive perimeter” approach, while not totally
useless, falls way short – there must be mutual
suspicion within the perimeter