9.8 Conclusion


9.8 Conclusion

In this chapter, we discussed various potential security mechanisms for your security architecture, including physical security, protocol and application security, encryption/ decryption, and perimeter and remote access security. Based on information from the requirements analysis, we developed input for a security and privacy plan. We also discussed elements of both internal and external relationships for the security architecture.




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net