Skip to Main Content
Securing Delay-Tolerant Networks with BPSec
book

Securing Delay-Tolerant Networks with BPSec

by Edward J. Birrane, III, Sarah Heiner, Ken McKeever
January 2023
Intermediate to advanced content levelIntermediate to advanced
352 pages
12h 37m
English
Wiley
Content preview from Securing Delay-Tolerant Networks with BPSec

13Achieving Security Outcomes

Security extensions, such as those provided by BPSec, are one portion of a larger security ecosystem. The construction of a trusted network supporting secured information exchange requires multiple portions of the BPv7 ecosystem to work together to achieve desired security outcomes.

This chapter defines the concept of a security outcome as a system-level expression of desired security behavior coupled with the policy, configuration, block definitions, and security context capabilities that must work together to achieve that outcome.

After reading this chapter you will be able to:

13.1 Security Outcomes

The overall purpose of a security policy is to achieve some set of security outcomes for message exchange in a network. These outcomes, as expressions of operational capabilities, can be very similar even across networks exhibiting very different behaviors and capabilities. In that context, security outcomes provide the approach necessary for trusted bundle exchange in any of the networking environments in which BPv7 might be deployed.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Enterprise Network Testing: Testing Throughout the Network Lifecycle to Maximize Availability and Performance

Andy Sholomon, Tom Kunath
Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Linux® Kernel Primer, The: A Top-Down Approach for x86 and PowerPC Architectures

Claudia Salzberg Rodriguez, Gordon Fischer, Steven Smolski
Switching to VoIP

Switching to VoIP

Theodore Wallingford

Publisher Resources

ISBN: 9781119823476Purchase Link