- Security in Computing, 4th Ed, Pfleeger
Network Security Controls - Previous chapters have presented several strategies for addressing security concerns,
- such as encryption for confidentiality and integrity, reference monitors for access control, and overlapping controls for defense in depth
- These strategies are also useful in protecting networks.
- Subsequent sections provide detailed explanations for three particularly important controls
- firewalls, intrusion detection systems, and encrypted e-mail.
Do'stlaringiz bilan baham: |