X hits on this document

Powerpoint document

Unifying the Conceptual levels of Network Security through use of Patterns. - page 26 / 30

78 views

0 shares

0 downloads

0 comments

26 / 30

Consequences

Advantages

Users are authenticated by the system. This helps to maintain a good logging system also.

The RBAC model helps authorization policies to be implemented within the system based on roles of the personnel.

Secure channels use strong encryption which helps confidentiality and data integrity.

Firewall and IDS helps to make the system more secure.

               Secure Systems Research GroupFlorida Atlantic University

Document info
Document views78
Page views78
Page last viewedTue Dec 06 22:12:41 UTC 2016
Pages30
Paragraphs286
Words1349

Comments