"It should encompass these areas: * Perimeter security protects the network applications from outside attack, through technologies such as firewall and intrusion detection. * Communications security provides data confidentiality, integrity and nonrepudiation, typically through the use of Secure Sockets Layer or IPsec virtual private networks (VPN)." . . . . .