Article Details

“Topological Aspects in References to Network Security” | Original Article

Kamlesh .*, Anju Dhull, in International Journal of Information Technology and Management | IT & Management


Security is optimized by lack of access; connectivity is optimized by complete access. Internet enabled organizations; wireless connectivity and roaming clientage have made network peripheries relatively transparent. Communication has become network savvy. People are collaborating with peers in the real time, using tools for convenience rather than security. Data has started to flow iii and outside the organization through wireless media and many users request a roaming profile, so that they can access parent network even from faraway places. Enterprises continue to invest heavily in perimeter security i.e. to bring security around the network, but not realizing the fact that security has to be within the network, i.e. in the network fabric itself not only at the periphery.