DocumentCode :
1340217
Title :
Representing our Networks
Author :
Potter, Bruce
Author_Institution :
Ponte Technologies
Volume :
12
Issue :
5
fYear :
2010
Firstpage :
58
Lastpage :
60
Abstract :
In theory, IT professionals use network diagrams throughout the information security lifecycle. When building a new system, we build diagrams that describe the overall architecture, how servers communicate, and wide-area-network (WAN) connectivity. When we assess systems, we use network diagrams to quickly understand the network design and to locate critical assets. And when an incident occurs, a diagram serves as the roadmap, identifying areas to monitor and isolating the attack ... at least, in theory.
Keywords :
diagrams; information technology; security of data; software architecture; IT professionals; information security lifecycle; network architecture; network diagrams; wide area network; Buildings; IP networks; Image color analysis; Information technology; Security; Servers; Network Diagrams; graphic design; information technology; network engineering;
fLanguage :
English
Journal_Title :
IT Professional
Publisher :
ieee
ISSN :
1520-9202
Type :
jour
DOI :
10.1109/MITP.2010.134
Filename :
5593037
Link To Document :
بازگشت