Hardware Reference
In-Depth Information
Introducing the security role
As we live in an interconnected world, we are exposed to misuses and attacks. As we
will see in this chapter, security is of utmost importance irrespective of whether it's a
small or large network. Even if role definitions require additional work, you should
take the security of your network into consideration. Just like you fasten the seat belt
in your car, you'd rather spend this extra time once and forget about it thereafter.
It can be summarized in 3 processes: write down all users who will require access,
itemize what resources they will have access to, and then connect the dots between
the lists. That's what we are going to see now.
An everyday use case - a house in
Springfield
Home will denote the scenario of a house in a town called Springfield where
Bart lives with Homer as the administrator. Most of the use cases that might be
encountered in everyday life have been gathered, as you can see in the picture.
The house is one of the greediest users of media you can find.
There are a desktop or laptop, computers, tablets, smartphones, gaming consoles,
and connected TV, and our house project must use all of them at the same time.
Nevertheless, you don't want to worry and spend your time on which user is
connected to the tablet and what they are doing. While you have to manage these
accesses, you'd certainly prefer to focus on the TV show and eventually take 5
minutes to allow the publication of some posts. You know how easy it is now.
 
Search WWH ::




Custom Search