1. Definitions
1.1 Perimeter
In IT security, the perimeter is the area over which an entity has physical and logical access control.
a company's office network connected to the Internet can constitute a perimeter, even if this network is deployed on several distinct geographical sites and in several countries.
A perimeter is often made up of several "sub-perimeters", as the level of risk varies according to the different networks making up the company. For example, as illustrated in figure 1 , a demilitarized zone, the office network, the accounting department network and the R&D department network make up the company...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Definitions
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Request for comments (RFC)
- REKHTER (Y.), MOSKOWITZ (B.), KARRENBERG (D.) et coll - Address Location for Private Internets - . RFC 1918, IETF (1996).
In Engineering Techniques
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!