Boundary protection: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
Latest revision as of 00:24, 20 January 2026
Boundary protection
Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g. gateways, routers, firewalls, guards, encrypted tunnels).
Source: CNSSI 4009-2015 | Category: