Abstract :
In theory, IT professionals use network diagrams throughout the information security lifecycle. When building a new system, we build diagrams that describe the overall architecture, how servers communicate, and wide-area-network (WAN) connectivity. When we assess systems, we use network diagrams to quickly understand the network design and to locate critical assets. And when an incident occurs, a diagram serves as the roadmap, identifying areas to monitor and isolating the attack ... at least, in theory.
Keywords :
diagrams; information technology; security of data; software architecture; IT professionals; information security lifecycle; network architecture; network diagrams; wide area network; Buildings; IP networks; Image color analysis; Information technology; Security; Servers; Network Diagrams; graphic design; information technology; network engineering;