Security Architectures

Security Architectures

Sophie Gastellier-Prevost
Copyright: © 2007 |Pages: 19
ISBN13: 9781599040905|ISBN10: 1599040905|ISBN13 Softcover: 9781616927523|EISBN13: 9781599040929
DOI: 10.4018/978-1-59904-090-5.ch001
Cite Chapter Cite Chapter

MLA

Gastellier-Prevost, Sophie. "Security Architectures." Advances in Enterprise Information Technology Security, edited by Djamel Khadraoui and Francine Herrmann, IGI Global, 2007, pp. 1-19. https://doi.org/10.4018/978-1-59904-090-5.ch001

APA

Gastellier-Prevost, S. (2007). Security Architectures. In D. Khadraoui & F. Herrmann (Eds.), Advances in Enterprise Information Technology Security (pp. 1-19). IGI Global. https://doi.org/10.4018/978-1-59904-090-5.ch001

Chicago

Gastellier-Prevost, Sophie. "Security Architectures." In Advances in Enterprise Information Technology Security, edited by Djamel Khadraoui and Francine Herrmann, 1-19. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-090-5.ch001

Export Reference

Mendeley
Favorite

Abstract

Within a more and more complex environment, where connectivity, reactivity and availability are mandatory, companies must be “electronically accessible and visible” (i.e., connection to the Web, e-mail exchanges, data sharing with partners, etc.). As such, companies have to protect their network and, given the broad range of security solutions on the IT security market, the only efficient way for them is to design a global secured architecture. After giving the reader all the necessary materials and explaining classical security and services needs, this chapter proposes three different realistic security-level architectures that may be currently deployed within companies. For more realistic analysis and illustration, two examples of companies with different size and profile are given. A number of advices, explanations and guidelines are provided in this chapter so readers are able to adapt those architectures to their own companies and both security and network needs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.