X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 26 / 30

97 views

0 shares

0 downloads

0 comments

26 / 30

Consequences

Advantages

Users are authenticated by the system. This helps to maintain a good logging system also.

The RBAC model helps authorization policies to be implemented within the system based on roles of the personnel.

Secure channels use strong encryption which helps confidentiality and data integrity.

Firewall and IDS helps to make the system more secure.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views97
Page views97
Page last viewedTue Jan 17 04:58:14 UTC 2017
Pages30
Paragraphs286
Words1349

Comments