Secure Network Zones

  • Wimmer P
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Large networks, which are often distributed over physically separate locations, require a coherent security approach. This paper introduces the concept of secure network zones, arranged in "onion-like" layers, providing increasing security levels towards the inner, more secure zones. Increased security is provided by both protective layers around sensitive networks and additional (cumulative) security measures, ranging from basic measures such as hardening and firewalls to more sophisticated techniques such as intrusion detection and encryption of transmitted and stored data. The implementation of secure network zones is described, including classification of data, assignment of applications to zones, and data flow. A path for the migration of existing environments is discussed and recommendations for special use cases are provided.

Cite

CITATION STYLE

APA

Wimmer, P. K. (2010). Secure Network Zones. In ISSE 2009 Securing Electronic Business Processes (pp. 230–241). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free