Information Security: A Defensive Battle |
| |
Abstract: | Abstract Medium to large networks usually comprise different types of security components. To establish an efficient security architecture, an engineer must fully understand the major role of each security component, its comparative advantage, and natural position. Although this article does not mention every type of the existing and emerging security product, it is possible to apply the battlefield analogies to virtually every type of security solution to simplify the complicated architecture of today's data networks. The basic security platform comprises a layered approach and an efficient way to synchronize security products at different layers of the network. |
| |
Keywords: | |
|
|