Next: 3.1.4 Provision of security
Up: 3.1 Interactions in adaptive
Previous: 3.1.2 Security engine interactions
As
we
pointed
out
earlier,
large
organizations
may
feel
a
need
to
manage
their
security
infrastructure
at
a
higher
level
and
establish
connectivity
between
security
domains.
This
may
be
done
in
order
to
- enforce
centrally
defined
policies
over
a
number
of
locations;
- detect
attacks
that
are
specifically
aimed
at
the
organization
but
that
are
distributed
over
various
locations
(as
may
be
done
by
professional
organizations),
all
administered
by
their
own
central
security
management
service;
- detect
abnormal
large
scale
threats
like
the
network
worms;
- aggregate
or
federate
security
systems
for
building
virtual
private
networks
(VPNs),
for
exchanging
authentication
information,
etc.;
- increase
assurance
of
availability
of
the
security
system.
(c) 1998, Filip Schepers