Skip to content
2000

Security Metric for Information Network

image of Security Metric for Information Network
Preview this chapter:

Given that dislodged working conditions are in play, system administrators are tasked with handling security solutions that, in turn, impact most of the working layers of the OSI model. This comprehensive approach depicts a situation in which the originator perceives that their data is traversing through a specified encryption process at every stage/layer, starting from the top layer (i.e., Application Layer) and gradually proceeding down to the last one (i.e., Physical Layer). Similarly, the decryption process takes place at every stage/layer at the destination end.&nbsp;<br>

/content/books/9789815049480.chapter-9
dcterms_subject,pub_keyword
-contentType:Journal
10
5
Chapter
content/books/9789815049480
Book
false
en
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test