Communication and IT networks in their most elementary form, consist of some network attached device used to exchange or receive information from some arbitrary set of other attached devices that generally packaged as services provided to user customers. Whether for physical or virtual capability instantiations, some design processes occur that are governed by requirements that allow those capabilities to meet expectations.
There are innumerable engineering methods, technical standards, and law that guide and govern this activity. When all of this guidance and governance is distilled, there emerge a set of recurring common capabilities that embedded “by design.” They are there for users or operators to make use of as a function of the conditions and context of the devices and services.
Indeed, the term “by design” itself has been used in recent years to describe specific capabilities – perhaps the most notable being “privacy by design”. It is also common throughout the world for public networks and devices to institute lawful inception or retained data capabilities by design. The ever growing enormous complexity of devices, software, and networks has resulted in exponential increases in exploited vulnerabilities that in turn has necessitated cyber security by design. When the recursive process of identifying all of these “by design” is undertaken, it appears there are ten of them with various sub-variants that emerge. These are enumerated and described here together with noting the synergies or conflicts that may exist among some of them.
- Edition:
- 1.1.1
- Published:
- 07/01/2016
- Number of Pages:
- 13
- File Size:
- 1 file , 130 KB
- Note:
- This product is unavailable in Russia, Ukraine, Belarus
Reviews
There are no reviews yet.