security architecture


A term used by the Symantec Security Response Center to refer to a plan and set of principles that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and also the performance levels required in the elements to deal with the threat environment.

Read Also:

  • security information management (SIM)

    SIM is short for security information management. It is a type of software that automates the collection of event log data from security devices, such as such as firewalls, proxy servers, intrusion-detection systems and antivirus software. The SIM translates the logged data into correlated and simplified formats. Many SIM architecture provides security reporting, analysis and […]

  • security policy

    A security policy is a document that outlines the rules, laws and practices for computer network access. This document regulates how an organization will manage, protect and distribute its sensitive information (both corporate and client information) and lays the framework for the computer-network-oriented security of the organization.

  • security software

    A general phrase used to describe any software that provides security for a computer or network. There are many types of security software including antivirus software, encryption software, firewall software and spyware removal software. Additionally, many operating systems also come preloaded with security software and tools. The two most common types of security software used […]

  • security software disabler Trojan

    A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.

  • seek time

    Refers to the time a program or device takes to locate a particular piece of data. For disk drives, the terms seek time and access time are often used interchangeably. Technically speaking, however, the access time is often longer the seek time because it includes a brief latency period.


Disclaimer: security architecture definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.