Information AssuranceThree Generations of Security Technology
Access Control & Physical Security
Multiple Levels of Security
Some Attacks will Succeed
(Operate Through Attacks)
- Intrusion Detection Systems
- Public Key Infrastructure
- Big Board View of Attacks
- Real-Time Situation Awareness & Response
- Real-Time Trade-Off of Performance, Functionality, and Security