Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
9.8 Conclusion
In this chapter, we discussed various potential security mechanisms for your security architecture, including physical security, protocol and application security, encryption/ decryption, and perimeter and remote access security. Based on information from the requirements analysis, we developed input for a security and privacy plan. We also discussed elements of both internal and external relationships for the security architecture.
Категории