X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 21 / 30

107 views

0 shares

0 downloads

0 comments

21 / 30

Forces (Contd…)

Any message from unknown or spurious remote locations should be discarded.

We should be able to detect any intrusions into the system and create alert logs.

Field Units and Communication Lines should be free from Physical Attacks.

Service should be available 24 hrs 7 days a week.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views107
Page views107
Page last viewedFri Jan 20 05:53:19 UTC 2017
Pages30
Paragraphs286
Words1349

Comments