Large networks, which are often distributed over physically separate locations, require a coherent security approach. This paper introduces the concept of secure network zones, arranged in "onion-like" layers, providing increasing security levels towards the inner, more secure zones. Increased security is provided by both protective layers around sensitive networks and additional (cumulative) security measures, ranging from basic measures such as hardening and firewalls to more sophisticated techniques such as intrusion detection and encryption of transmitted and stored data. The implementation of secure network zones is described, including classification of data, assignment of applications to zones, and data flow. A path for the migration of existing environments is discussed and recommendations for special use cases are provided.
CITATION STYLE
Wimmer, P. K. (2010). Secure Network Zones. In ISSE 2009 Securing Electronic Business Processes (pp. 230–241). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_23
Mendeley helps you to discover research relevant for your work.