Escolar Documentos
Profissional Documentos
Cultura Documentos
If a network is to provide security services, the infrastructure of that network itself needs to be secure. This concept borrows directly from operating system security, where the term Trusted Computing Base is used to specify an operating system that properly enforces its security policy only if it is itself resistant to attacks. This is a simple rule, which is valid with any security system and is therefore of paramount importance in network security. Though specialized security devices, such as firewalls, might be designed to be resistant to attacks, many network devices are not. Moreover, most common network devices come preconfigured with settings that might not be desirable when a certain level of network security needs to be provided.
Overview
To provide security services, the network infrastructure needs to be secure itself.