DocumentCode
1340217
Title
Representing our Networks
Author
Potter, Bruce
Author_Institution
Ponte Technologies
Volume
12
Issue
5
fYear
2010
Firstpage
58
Lastpage
60
Abstract
In theory, IT professionals use network diagrams throughout the information security lifecycle. When building a new system, we build diagrams that describe the overall architecture, how servers communicate, and wide-area-network (WAN) connectivity. When we assess systems, we use network diagrams to quickly understand the network design and to locate critical assets. And when an incident occurs, a diagram serves as the roadmap, identifying areas to monitor and isolating the attack ... at least, in theory.
Keywords
diagrams; information technology; security of data; software architecture; IT professionals; information security lifecycle; network architecture; network diagrams; wide area network; Buildings; IP networks; Image color analysis; Information technology; Security; Servers; Network Diagrams; graphic design; information technology; network engineering;
fLanguage
English
Journal_Title
IT Professional
Publisher
ieee
ISSN
1520-9202
Type
jour
DOI
10.1109/MITP.2010.134
Filename
5593037
Link To Document