Community of Interest (computer Security) - Security Mechanisms

Security Mechanisms

COI security requirements can range in sophistication from simple network file shares to an interconnection of physically separate sites that are connected via dedicated communication circuits. COI security mechanisms and the respective basic characteristics are identified in the Table. These security mechanisms may be utilized individually and in combinations to provide the requisite security for each COI. COI architecture can overlay the existing LAN or WAN architecture in order to maximize the use of existing resources and to provide the required COI separation in the most efficient manner.

COI's that require additional dedicated physical resources (e.g., dedicated Router, VPN and firewalls devices) are usually more complex in nature and expensive to operate because of the added network devices and the personnel to operate and manage them. They also add the benefit of more security utilizing the Defense in Depth approach. A COI does not necessarily imply a physical separation of the infrastructure, but can do so.

Read more about this topic:  Community Of Interest (computer Security)

Famous quotes containing the word security:

    There is something that Governments care for far more than human life, and that is the security of property, and so it is through property that we shall strike the enemy.... Be militant each in your own way.... I incite this meeting to rebellion.
    Emmeline Pankhurst (1858–1928)