Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 12, Problem 4RQ
Program Plan Intro

Trusted network:

A trusted network is a network of devices that are connected to each other, open only to approved users and permits transmission only for protected data. It includes the following features

  • Authentication
  • Encryption
  • Firewall
  • Private Network.

Untrusted network:

Untrusted networks are situated outside the security perimeter and control the network admin. They could even be a private or a shared network. It includes the following characteristics

  • Loosely maintained
  • Unmonitored
  • Readily compromised from the outside network.

Firewall:

  • Firewall is a hardware or software program which is used to permit files to arrive in the network based on the privacy.
  • It is present at the gateway of the network, used to protect the traffic flow and privacy in the network.
  • It is a tool for a network to protect from illegal access from the private network.

Blurred answer
Students have asked these similar questions
Is there a typical link between a network that cannot be trusted, a firewall, and a network that can be trusted, and how does this connection function?
What is the normal relationship between an untrusted network, a firewall, and a trusted network, and how do they interact with one another?
In a typical scenario, how do a trusted network, an untrusted network, and a firewall relate to one another and how do they function together?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,