Fandom

The IT Law Wiki

Boundary protection technologies

32,196pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definition Edit

Boundary protection technologies

demark a logical or physical boundary between protected information and systems and unknown users. Boundary protection technologies can be used to protect a network (for example, firewalls) or a single computer (for example, personal firewalls).[1]

Overview Edit

"Generally, these technologies prevent access to the network or computer by external unauthorized users. Another type of boundary protection technology, content management, can also be used to restrict the ability of authorized system or network users to access systems or networks beyond the system or network boundary."[2]

References Edit

  1. Technology Assessment: Cybersecurity for Critical Infrastructure Protection, at 147.
  2. Id.

See also Edit

Also on Fandom

Random Wiki