-
In this case, the cyber identity of this file would be a full set of its cyber coordinates in the IP subspace: the computer IP address, its MAC address, a Port number associated with the particular application, and the file name would constitute the full set of cyber coordinates, singularly identifying a cyber object (our file) in cyberspace.
FORBES: Cyber Security Fails As 3.6 Million Social Security Numbers Breached In South Carolina
-
Security solutions based on physical infrastructure, and policy expressed in terms of a particular device, the corporate PC, an IP address, network port, or application protocol are becoming useless in a mobile, borderless world.
FORBES: Going Mobile: Security in the Age of Ubiquity
-
Sandy damaged fuel import terminals in the NY area, which was a critical blow since the port of NY is the most important petroleum hub in the northeastern U.S. In particular, Hess still has four marine terminals with suspended operations.
FORBES: Gas Rationing: New Yorkers, Welcome to the Third World