X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 22 / 30

76 views

0 shares

0 downloads

0 comments

22 / 30

Solution

Authentication is done at the Remote and the Central Controller unit to make sure that only Authorized personnel have entry access to the system.

We can create secure VPN channels at the Central Controller and the Remote units so that we can send confidential messages. This also makes sure that the integrity of data is maintained.

Intrusion Detection Systems are able to detect any intrusions to the systems based on misuse based detection or anomaly based detection.

Firewalls prevent messages from unknown and dangerous sites from reaching the system.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views76
Page views76
Page last viewedTue Dec 06 12:57:51 UTC 2016
Pages30
Paragraphs286
Words1349

Comments