inverted network


An inverted network design employs the philosophy that that security should be focused at the core of the network rather than on the perimeter (where firewalls, anti-virus and iintrusion detection systems would typically sit). Recognizing the increasingly threats to the enterprise network come from with, even internal LANs — and every component connected to it — are considered “dirty.” For example, in an inverted network, VPN connections would be established from the desktop to the server.

Read Also:

  • invisible Web

    (n.) Also referred to as the deep Web, the term refers to either Web pages that cannot be indexed by a typical search engine or Web pages that a search engine purposely does not index, rendering the data “invisible” to the general user. One of the most common reasons that a Web site��s content is […]

  • invocation

    The execution of a program or function.

  • invisible text

    See under keyword stuffing.

  • invoke

    To activate. One usually speaks of invoking a function or routine in a program. In this sense, the term invoke is synonymous with call.

  • iPad 2

    A new handheld computing device launched by Apple, less than a year after the company first introduced the iPad. The Apple iPad 2 offers some improvements over the original iPad design including being thinner, lighter and faster. Apple also boasts a 10-hour battery life with the iPad 2. The iPad 2 uses a 1-GHz dual-core […]


Disclaimer: inverted network definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.