Defining robust security architectures is vital for protecting IT infrastructures from cyber-attacks. This is especially true when the IT infrastructure is going to be used by investigators and law enforcement agencies to combat crime across EU. A compromise between the level of security and the level of acceptable risk must be found. As a first step it is mandatory to perfectly understand the security requirements applicable to our infrastructure, the security services needed and how these security services should be distributed over the logical layers of the system. This chapter describes the analysis and the methodology followed in the Odyssey project (see chapter 2) to define a security-layered architecture able to support a secure Pan-European ballistics and crime information intelligence network designed to help tackle organized crime and terrorism.
CITATION STYLE
Rodriguez, R. D. (2011). Secure architecture. In Advanced Information and Knowledge Processing (pp. 35–48). Springer London. https://doi.org/10.1007/978-1-4471-2140-4_3
Mendeley helps you to discover research relevant for your work.