Community of Interest (computer Security) - COI Construction

COI Construction

A standard approach to COI segregation can be through the use of group policies if the LAN or WAN infrastructure utilizes the Microsoft Windows Operating System utilizing the Active Directory service. Additional dedicated COI boundary security components such as a Router, VPN, firewall, and IDS can be provided depending upon the requirement needs of a COI. COI’s can be designed and deployed by employing the security mechanisms that are listed in the Table. Typically each individual COI may have unique characteristics and requirements. The security mechanisms listed above are the basic building blocks in the construction of all COI's.

Read more about this topic:  Community Of Interest (computer Security)

Famous quotes containing the word construction:

    No real “vital” character in fiction is altogether a conscious construction of the author. On the contrary, it may be a sort of parasitic growth upon the author’s personality, developing by internal necessity as much as by external addition.
    —T.S. (Thomas Stearns)

    There’s no art
    To find the mind’s construction in the face:
    He was a gentleman on whom I built
    An absolute trust.
    William Shakespeare (1564–1616)