What are the Primary Security Architectures in use Today?by@asaf
5,342 reads

What are the Primary Security Architectures in use Today?

April 20th 2019
9m
by @asaf 5,342 reads
tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Traditional network perimeter security is made up of many different parts, all of which work together to provide a security solution for the network. Traditional perimeter security will begin with the authentication of the user, generally by using a username and password. Traditional security will then make sure that access protocol is followed by placing restrictions on what the user can access within the network when unauthorized. Some businesses may also deploy honeypots, a decoy network that is set up with deliberate security flaws. Remote workers and other offices can establish a secure connection to the head office’s network without the risk of an attacker infiltrating the network through remote user.

Company Mentioned

Mention Thumbnail
featured image - What are the Primary Security Architectures in use Today?
Asaf Fybish HackerNoon profile picture

@asaf

Asaf Fybish

I write about Tech, Cyber and Marketing. Not in the exact order.


Receive Stories from @asaf

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!