X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 21 / 30

82 views

0 shares

0 downloads

0 comments

21 / 30

Forces (Contd…)

Any message from unknown or spurious remote locations should be discarded.

We should be able to detect any intrusions into the system and create alert logs.

Field Units and Communication Lines should be free from Physical Attacks.

Service should be available 24 hrs 7 days a week.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views82
Page views82
Page last viewedWed Dec 07 16:30:04 UTC 2016
Pages30
Paragraphs286
Words1349

Comments