Authentication is done at the Remote and the Central Controller unit to make sure that only Authorized personnel have entry access to the system.
We can create secure VPN channels at the Central Controller and the Remote units so that we can send confidential messages. This also makes sure that the integrity of data is maintained.
Intrusion Detection Systems are able to detect any intrusions to the systems based on misuse based detection or anomaly based detection.
Firewalls prevent messages from unknown and dangerous sites from reaching the system.
Secure Systems Research Group – Florida Atlantic University