Sunday, March 28, 2010

Deployment of Internet security infrastructure model

The Internet security protection can design and deploy in two structural models for end users. Internet security software designs for end users and it bases on global strategy frameworks in Non-biological systems. Two models can implement in systems as follows.
A centralized security control
This approach constraints interaction scenarios and websites-communications for end users and creates critical information and availability issues. End users do not have ethical, legal, and social interaction issue on the Internet in such a pattern.
A decentralized security model
This approach is Internet liberal value for end users and it indicates that Internet interactions allow file sharing across Internet. A decentralize infrastructure model contributes and promotes democracy in the Internet; nevertheless, data integrity issues and security risks for end users make this security model vulnerable. End users interaction over Internet can trace in this architecture model. System owner can allocate end- users preference maps and integrate with unique parameters. End users have ethical, legal, and social interaction issue on the Internet in such a pattern. Decoy strategy may deploy on the Internet against end users. Both approaches have invisible entities and generate complexity in long term.

No comments: