Jump to content

Boundary protection: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
 
imported>Unknown user
No edit summary
(No difference)

Revision as of 01:42, 15 January 2026

Languages: English | Français

Boundary protection

Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g. gateways, routers, firewalls, guards, encrypted tunnels).


Source: CNSSI 4009-2015 | Category: