• DocumentCode
    1340217
  • Title

    Representing our Networks

  • Author

    Potter, Bruce

  • Author_Institution
    Ponte Technologies
  • Volume
    12
  • Issue
    5
  • fYear
    2010
  • Firstpage
    58
  • Lastpage
    60
  • Abstract
    In theory, IT professionals use network diagrams throughout the information security lifecycle. When building a new system, we build diagrams that describe the overall architecture, how servers communicate, and wide-area-network (WAN) connectivity. When we assess systems, we use network diagrams to quickly understand the network design and to locate critical assets. And when an incident occurs, a diagram serves as the roadmap, identifying areas to monitor and isolating the attack ... at least, in theory.
  • Keywords
    diagrams; information technology; security of data; software architecture; IT professionals; information security lifecycle; network architecture; network diagrams; wide area network; Buildings; IP networks; Image color analysis; Information technology; Security; Servers; Network Diagrams; graphic design; information technology; network engineering;
  • fLanguage
    English
  • Journal_Title
    IT Professional
  • Publisher
    ieee
  • ISSN
    1520-9202
  • Type

    jour

  • DOI
    10.1109/MITP.2010.134
  • Filename
    5593037