• Access Control: This requires both the authorization and authentication process.
**************************************************************************************************
• Scanning: It scans the traffic on the network for potential risk scenario and also the stored data traffic is
scanned and protected. This is because access would be granted to data stored remotely over the network.
The scanning protective measures utilizes recognizable patterns to identify virus threats and attacks on
the network.
**************************************************************************************************
• Cryptography: This enables the secure communication between nodes in the network, secure electronic
commerce for online transaction, and securing data. With this the transaction between the organization
and customers would be secured
***************************************************************************************************
• Network Perimeter Defenses: this creates a security measure around the full network