{"id":937,"date":"2007-05-05T07:06:00","date_gmt":"2007-05-05T07:06:00","guid":{"rendered":"https:\/\/mhgoldberg.com\/blog\/?p=937"},"modified":"2007-05-05T07:06:00","modified_gmt":"2007-05-05T07:06:00","slug":"systemic-network-security","status":"publish","type":"post","link":"https:\/\/mhgoldberg.com\/blog\/?p=937","title":{"rendered":"Systemic network security"},"content":{"rendered":"<div style=\"text-align: justify;\"><img decoding=\"async\" style=\"margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;\" alt=\"Nortel\" src=\"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif\" border=\"0\" \/>Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting <span style=\"font-style: italic;\"><a href=\"http:\/\/blogs.nortel.com\/johnroese\/2007\/05\/01\/security-built-in-not-bolted-on\/\">Security built in, not bolted on<\/a><\/span>. His views were stimulated by <a href=\"http:\/\/news.com.com\/Schneier+questions+need+for+security+industry\/2100-7355_3-6179500.html\">CNet coverage<\/a> of a talk delivered by <a href=\"http:\/\/www.schneier.com\/\">Bruce Schneier<\/a> [of <a href=\"http:\/\/www.counterpane.com\/\">BT Counterpane<\/a>] at Info Security Europe 2007.<\/p>\n<p>In the blog post, John speaks of the challenges of <\/p>\n<blockquote style=\"color: rgb(102, 102, 102); text-align: justify;\"><p><span style=\"font-size:85%;\">the nice simple, high-performance, global Internet was so unintelligent that it could barely detect, much less defend, itself from these attacks<\/span><\/p><\/blockquote>\n<p>How do service providers guard their own networks and provide security to their customers? Some might ask, &#8220;should they?&#8221;<\/p>\n<p>Contrast the current internet with his view of the future: <\/p>\n<blockquote style=\"color: rgb(102, 102, 102); text-align: justify;\"><p><span style=\"font-size:85%;\">One of the reasons I feel that WiMAX 802.16e (not just the RF part but the whole system) has a strong possibility of playing a major role in the 4G hyperconnected future is that in addition to being a high-performance, low-cost broadband transport system, it leverages the IEEE security learnings (specifically the trials and errors of the Wi-Fi world) to deliver a system that makes few assumptions about the end systems\u2019 security, but realizes that it must control access, protect transport and remain resilient even in the presence of the unknown.<\/span><\/p><\/blockquote>\n<p>The CNet article cites Lord Alec Broers, chair of the House of Lords science and technology committee, as having suggested that every company, from operating system and application vendors to ISPs, needs to take greater responsibility for the security of end users.<\/p>\n<p>As I mentioned earlier, John Roese is delivering the closing keynote address at <a style=\"text-decoration: none;\" href=\"http:\/\/www.telecomsummit.com\/\"><span style=\"font-weight: bold;\">The 2007 Canadian Telecom Summit<\/span><\/a>, June 13.<\/p>\n<p><span style=\"color: rgb(51, 204, 0);font-size:78%;\">Technorati Tags:<br \/><a href=\"http:\/\/technorati.com\/tag\/John+Roese\" rel=\"tag\">John Roese<\/a>, <a href=\"http:\/\/technorati.com\/tag\/Nortel\" rel=\"tag\">Nortel<\/a>, <a href=\"http:\/\/technorati.com\/tag\/Bruce+Schneier\" rel=\"tag\">Bruce Schneier<\/a>, <a href=\"http:\/\/technorati.com\/tag\/Canadian+Telecom+Summit\" rel=\"tag\">Canadian Telecom Summit<\/a><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not bolted on. His views were stimulated by CNet coverage of a talk delivered by Bruce Schneier [of BT Counterpane] at Info Security Europe 2007. In the blog post, John speaks of &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/mhgoldberg.com\/blog\/?p=937\"> <span class=\"screen-reader-text\">Systemic network security<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","two_page_speed":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-937","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Systemic network security &#8226; Telecom Trends<\/title>\n<meta name=\"description\" content=\"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not &#8226; May 5, 2007\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mhgoldberg.com\/blog\/?p=937\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Systemic network security &#8226; Telecom Trends\" \/>\n<meta property=\"og:description\" content=\"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not &#8226; May 5, 2007\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mhgoldberg.com\/blog\/?p=937\" \/>\n<meta property=\"og:site_name\" content=\"Telecom Trends\" \/>\n<meta property=\"article:published_time\" content=\"2007-05-05T07:06:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif\" \/>\n<meta name=\"author\" content=\"Mark Goldberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mark_goldberg\" \/>\n<meta name=\"twitter:site\" content=\"@mark_goldberg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Goldberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937\"},\"author\":{\"name\":\"Mark Goldberg\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/person\\\/3fb9ac7e53dc710f23be648a3b1ab4d7\"},\"headline\":\"Systemic network security\",\"datePublished\":\"2007-05-05T07:06:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937\"},\"wordCount\":271,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.gstconferences.com\\\/gst\\\/logos\\\/sponsors_50_nortel.gif\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937\",\"name\":\"Systemic network security &#8226; Telecom Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.gstconferences.com\\\/gst\\\/logos\\\/sponsors_50_nortel.gif\",\"datePublished\":\"2007-05-05T07:06:00+00:00\",\"description\":\"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not &#8226; May 5, 2007\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?p=937#primaryimage\",\"url\":\"http:\\\/\\\/www.gstconferences.com\\\/gst\\\/logos\\\/sponsors_50_nortel.gif\",\"contentUrl\":\"http:\\\/\\\/www.gstconferences.com\\\/gst\\\/logos\\\/sponsors_50_nortel.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/\",\"name\":\"Telecom Trends\",\"description\":\"A Canadian perspective on trends in telecom\",\"publisher\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#organization\",\"name\":\"Mark H Goldberg & Associates Inc.\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/mark_logo_png.png\",\"contentUrl\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/mark_logo_png.png\",\"width\":3484,\"height\":1444,\"caption\":\"Mark H Goldberg & Associates Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/mark_goldberg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mhgoldberg.com\\\/blog\\\/#\\\/schema\\\/person\\\/3fb9ac7e53dc710f23be648a3b1ab4d7\",\"name\":\"Mark Goldberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g\",\"caption\":\"Mark Goldberg\"},\"description\":\"Mark Goldberg has more than 40 years of international experience in strategic planning, managing, designing and implementing telecommunications carrier networks.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Systemic network security &#8226; Telecom Trends","description":"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not &#8226; May 5, 2007","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mhgoldberg.com\/blog\/?p=937","og_locale":"en_US","og_type":"article","og_title":"Systemic network security &#8226; Telecom Trends","og_description":"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not &#8226; May 5, 2007","og_url":"https:\/\/mhgoldberg.com\/blog\/?p=937","og_site_name":"Telecom Trends","article_published_time":"2007-05-05T07:06:00+00:00","og_image":[{"url":"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif","type":"","width":"","height":""}],"author":"Mark Goldberg","twitter_card":"summary_large_image","twitter_creator":"@mark_goldberg","twitter_site":"@mark_goldberg","twitter_misc":{"Written by":"Mark Goldberg","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mhgoldberg.com\/blog\/?p=937#article","isPartOf":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=937"},"author":{"name":"Mark Goldberg","@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/person\/3fb9ac7e53dc710f23be648a3b1ab4d7"},"headline":"Systemic network security","datePublished":"2007-05-05T07:06:00+00:00","mainEntityOfPage":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=937"},"wordCount":271,"commentCount":0,"publisher":{"@id":"https:\/\/mhgoldberg.com\/blog\/#organization"},"image":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=937#primaryimage"},"thumbnailUrl":"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mhgoldberg.com\/blog\/?p=937#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mhgoldberg.com\/blog\/?p=937","url":"https:\/\/mhgoldberg.com\/blog\/?p=937","name":"Systemic network security &#8226; Telecom Trends","isPartOf":{"@id":"https:\/\/mhgoldberg.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=937#primaryimage"},"image":{"@id":"https:\/\/mhgoldberg.com\/blog\/?p=937#primaryimage"},"thumbnailUrl":"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif","datePublished":"2007-05-05T07:06:00+00:00","description":"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not &#8226; May 5, 2007","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mhgoldberg.com\/blog\/?p=937"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mhgoldberg.com\/blog\/?p=937#primaryimage","url":"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif","contentUrl":"http:\/\/www.gstconferences.com\/gst\/logos\/sponsors_50_nortel.gif"},{"@type":"WebSite","@id":"https:\/\/mhgoldberg.com\/blog\/#website","url":"https:\/\/mhgoldberg.com\/blog\/","name":"Telecom Trends","description":"A Canadian perspective on trends in telecom","publisher":{"@id":"https:\/\/mhgoldberg.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mhgoldberg.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mhgoldberg.com\/blog\/#organization","name":"Mark H Goldberg & Associates Inc.","url":"https:\/\/mhgoldberg.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mhgoldberg.com\/blog\/wp-content\/uploads\/2021\/02\/mark_logo_png.png","contentUrl":"https:\/\/mhgoldberg.com\/blog\/wp-content\/uploads\/2021\/02\/mark_logo_png.png","width":3484,"height":1444,"caption":"Mark H Goldberg & Associates Inc."},"image":{"@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/mark_goldberg"]},{"@type":"Person","@id":"https:\/\/mhgoldberg.com\/blog\/#\/schema\/person\/3fb9ac7e53dc710f23be648a3b1ab4d7","name":"Mark Goldberg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/716530aafa7ae4ea72f4887cbcfc45304504ef5d23bb57e4cd0251e2802ada33?s=96&d=mm&r=g","caption":"Mark Goldberg"},"description":"Mark Goldberg has more than 40 years of international experience in strategic planning, managing, designing and implementing telecommunications carrier networks."}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"tenweb_optimizer_mobile":false,"tenweb_optimizer_tablet":false},"uagb_author_info":{"display_name":"Mark Goldberg","author_link":"https:\/\/mhgoldberg.com\/blog\/?author=2"},"uagb_comment_info":0,"uagb_excerpt":"Nortel CTO John Roese has some interesting insights on network intelligence and the implications on security in his blog posting Security built in, not bolted on. His views were stimulated by CNet coverage of a talk delivered by Bruce Schneier [of BT Counterpane] at Info Security Europe 2007. In the blog post, John speaks of&hellip;","_links":{"self":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=937"}],"version-history":[{"count":0,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/937\/revisions"}],"wp:attachment":[{"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mhgoldberg.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}