504 ◾ Information Security Management Handbook
link speeds, but, conversely, provisioning a high level of bandwidth on a link is also not a replace-
ment for properly configuring QoS on the network. When balanced in concert, these elements of
networking work well together to provide optimal performance while not wasting bandwidth or
network resources.
Segment Summary
Sensing and actuation, physical access control, and video surveillance/analysis are key technologies
among many available and developing solutions for providing perimeter intrusion detection for
security professionals and their respective teams. It can also be shown that when we leverage the
reach and robustness of IP-based networks to aid in the integration of disparate system ...