Putting systems in specific places to increase security is called […]
Ex:
- Firewall separating trusted and untrusted networks
- Honeypots
- Sensors
Device Placement
To provide more granular security, you can use area based security technologies called […]. This simplifies security policies
Untrusted VS Trusted
Internal VS External
Security Zones
The […] of your network is everything that’s considered a vulnerability, and should be minimized to the best of your ability
Attack Surface
The […] of your network should be secure through the use of physical and logical solutions
Connectivity