Thursday, July 5, 2018

Word of the Day: holistic security

Word of the Day WhatIs.com
Daily updates on the latest technology terms |July 5, 2018
holistic security

Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system. The ultimate purpose of holistic security is continuous protection across all attack surfaces: the totality of all physical, software, network and human exposure.

Based on systems thinking, holistic security involves consideration of how any security system's constituent parts interrelate and work within the context of larger systems. A holistic approach can be applied to almost anything that requires security be it a person, a computer, a network, a building or a property, but must always be considered within the broader context.

The integration of different levels and types of security enables a more comprehensive understanding of vulnerabilities and more comprehensive protection against a variety of threats.

For security to be considered holistic, a number of requirements must be met. First, separate areas of security must be applied together: locks, for example, in the physical environment and security software in the virtual environment. Holistic security also demands that systems and devices be compatible and interoperable.

Employees, also an integral part of the system, need to be trained. All employees should be encouraged to provide feedback and suggestions and identify any security holes they detect. Security policies and procedures must be clearly understood by all personnel and those who will be working with the security system should have input to its implementation.

Holistic security is increasingly crucial in light of the developing Internet of Things (IoT). IoT security is complicated by the huge numbers of non-computing devices and other objects (things) being outfitted with networking and data transfer capabilities. Because these systems often communicate over the internet and/or interface with other networks, it's essential that they and their extended environments are secured.

Quote of the Day

"There are far too many technologies built to different standards and specifications by multiple vendors, making it impractical for one company to provide a holistic security solution alone." - Sanjay Khatri

 

Trending Terms

attack surface
systems thinking
IoT security
vulnerability
SIEM
risk intelligence

 
Learning Center

Holistic security for database-centric applications
In this exclusive video presentation, Nemertes Research Senior Vice President and Founding Partner Andreas Antonopoulos provides an executive overview of the security issues of securing database-centric applications and the key tactics essential to success.

What do we need to make IoT security a reality?
Security models for PCs and smartphones are not applicable to the Internet of Things, according to IoT security researcher Angela Orebaugh.

Holistic fraud reduction through customer security management
A holistic approach to fraud reduction by focusing on customer behavior across multiple channels would help banks fight fraud. Fraud reduction requires a holistic approach lacking in today's fraud detection technology.

Prevent enterprise IoT security challenges with preparation
Knowing the risks of the Internet of Things and taking the proper precautions are critical to preventing enterprise IoT security challenges down the line.

IoT World reveals the Wild West of IoT standards
While many industry insiders are advocating interoperability among Internet of Things standards, the market is still fragmented and vertical-specific.

Writing for Business

It only takes one user ________ security policies to give an attacker access to network data.
A. flouting
B. flaunting

Answer

 

 

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

No comments: