Ian Johnstone-Bryden's thought-provoking post Bandwidth vs. Knowledge has
stimulated me to ask a question that is tangentially related to firewalls and
that is giving me some problems.
In parallel with efforts to develop a policy for dealing with distributed
systems and Internet access, I am confronted with the difficulty of evaluating
the nature of what is being protected. That is, classifying the data and
objects to be protected. My searchs around the net for information on this
subject have netted (no pun intended) me little other than information
concerning confidentiality classification, whereas I am interested in the more
general categories of availability and data integrity as well.
Part of the problem is to establish efficient pigeon holes, but the real
difficulty is to verify that upstream or downstream classifications and policies
do not compromise something in the middle. Does anyone know how this is done?
Is there software smart enough to help? Can anyone point me to the right
site(s) to find information and/or like minded people?
Many thanks for any help. If replies are inappropriate to the list, please
e-mail me directly.
com (not yet on the 'net)
PS: How about "moat creature", after Chapman & Zwicky's metaphor on p 18?