Security Architecture and Design

Each type of information system platform (e.g., workstations, servers, storage area network, switches, firewalls, routers, virtualization, or cloud computing) that makes up the information technology infrastructure has its own unique vulnerabilities.

Security architecture is fundamental to enforcing security policies that can be applied at different layers for each type of system platform. This architecture is based on how the enterprise will handle each of the following:


  • Allowable and disallowable services and protocols
  • Vulnerability scanning
  • Patch management
  • Firmware or software upgrades

A security professional then sets standards for safeguards and controls for each platform. When designing the security architecture, a security architect or engineer should take the stance of an attacker to eliminate major vulnerabilities or reduce risks at each of the various platforms. This would entail a network engineer or security professional to use the same methods and tools that a hacker might use to determine vulnerabilities.

More about : network levels

Comments

  1. If you're trying to lose fat then you absolutely have to start following this totally brand new custom keto meal plan.

    To create this keto diet service, certified nutritionists, fitness couches, and top chefs united to produce keto meal plans that are efficient, suitable, economically-efficient, and delicious.

    Since their launch in January 2019, hundreds of individuals have already remodeled their body and well-being with the benefits a good keto meal plan can provide.

    Speaking of benefits: clicking this link, you'll discover eight scientifically-tested ones given by the keto meal plan.

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Change the Password on Microsoft Outlook

must-have tools for network working admins

Common DNS Issues