The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security Architectures
Abstract
Within a more and more complex environment, where connectivity, reactivity and availability are mandatory, companies must be “electronically accessible and visible” (i.e., connection to the Web, e-mail exchanges, data sharing with partners, etc.). As such, companies have to protect their network and, given the broad range of security solutions on the IT security market, the only efficient way for them is to design a global secured architecture. After giving the reader all the necessary materials and explaining classical security and services needs, this chapter proposes three different realistic security-level architectures that may be currently deployed within companies. For more realistic analysis and illustration, two examples of companies with different size and profile are given. A number of advices, explanations and guidelines are provided in this chapter so readers are able to adapt those architectures to their own companies and both security and network needs.
Related Content
Margee Hume, Paul Johnston.
© 2017.
19 pages.
|
Jessy Nair, D. Bhanu Sree Reddy.
© 2017.
27 pages.
|
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski.
© 2017.
19 pages.
|
Klaus Wölfel.
© 2017.
33 pages.
|
Rui Pedro Marques.
© 2017.
21 pages.
|
Ebru E. Saygili, Arikan Tarik Saygili.
© 2017.
17 pages.
|
Aparna Raman, D. P. Goyal.
© 2017.
41 pages.
|
|
|