business: information technology (IT)
technical: information technology (IT)
Managing Technology: Network Configurations
by Brent Kirkpatrick
(Date Published: 1/22/2018.)
Suppose you have a network of 10 routers and 100 end-points, some of which are clients and some are servers. You need to choose a secure configuration of your network. There are 245 ways to connect the 10 routers to each other and 10100 ways to connect the end-points to the routers. This comes out to at least 3.5 x 10113 ways to arrange your network. Some arrangments are more secure than others.
In order for your network to enable your business, you need to manage your network arrangement in a way that blocks hackers. The way that you position the routers relative to each other, relative to the servers, and relative to the clients matters for your security posture. Which configurations give you more depth of security? Which ones are more risky?
Intrepid Net Computing is developing principles of network design. Secure your infrastructure. Secure your data.
defendIT (TM). AI-driven security measures derived from security incident data.