

Author: Bell Graham P Kavanagh David
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.2, Iss.3, 1994-03, pp. : 26-28
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
If you understand the fundamental objectives of your organization and how your telecommunication network assists you to achieve these objectives you will have a sound basis for the development of network security. The types of potential interruption must also be understood remembering that small, intermittent failures can be worse than complete collapse. Risk exposures can be prioritized and contingency plans established. Duplicated carrier communications, private network triangulation, and virtual private networks are considered as well as ISDN and switched backup services. The consolidation of discrete services to make switching to alternative sites much easier is also suggested.
Related content


Design and Implementation of a Wide Area Network
Journal of Cases on Information Technology (JCIT), Vol. 4, Iss. 1, 2002-01 ,pp. :


The characterization of a wide area network computation
By Freitas C.J. Coffin D.B. Murphy R.L.
Parallel Computing, Vol. 29, Iss. 7, 2003-07 ,pp. :




Optimal Network Design for Wireless Local Area Network
By Mateus G.R.
Annals of Operations Research, Vol. 106, Iss. 1-4, 2001-09 ,pp. :