Topological Aspects in References to Network Security
Examining the Role of Network Topology in Enhancing Security
Keywords:
topological aspects, references, network security, access, connectivity, internet enabled organizations, wireless connectivity, roaming clientage, network peripheries, transparentAbstract
Security is optimized by lack of access; connectivity is optimized by complete access. Internet enabled organizations; wireless connectivity and roaming clientage have made network peripheries relatively transparent. Communication has become network savvy. People are collaborating with peers in the real time, using tools for convenience rather than security. Data has started to flow iii and outside the organization through wireless media and many users request a roaming profile, so that they can access parent network even from faraway places. Enterprises continue to invest heavily in perimeter security i.e. to bring security around the network, but not realizing the fact that security has to be within the network, i.e. in the network fabric itself not only at the periphery.Downloads
Download data is not yet available.
Published
2011-08-01
Issue
Section
Articles