Home » Posts tagged 'cyberthreats'
Tag Archives: cyberthreats
By Dan Allen, Research Fellow
In the cyberworld, computer servers, routers, firewalls, and other similar technologies, sit at the outermost edge, or perimeter, of a protected computer network. These cyber devices form a boundary between vulnerable internal resources and outside networks (such as the internet), and hackers often focus on breaching these “edge” devices. For example, successful cyberattacks at the web application layer perimeter can bypass perimeter security provided by a network firewall, server, and routers. Similarly, threats resulting from climate change, which are also multifaceted and multidirectional in nature, can bypass traditional, one-dimensional, perimeter-focused risk prevention methods such as the infamously inadequate system of storm categorization that measure a storm’s strength in terms of wind velocity, but says little about how a storm will interact with the tides to create a destructive storm surge.