Network Security
Roles: defender, perimeter, threat, traffic, rule, trusted-zone, untrusted-zone
The defense of digital infrastructure through perimeters, access rules, and traffic inspection. Defines space in terms of trust zones separated by controlled boundaries. Structurally interesting because it reveals how security thinking creates binary inside/outside distinctions, and how those distinctions break down as networks become more porous and distributed.
Applied To This Frame (9)
- mythology → Achilles' Heel
- forensics → Audit Trails Are Forensic Footprints
- mythology → Cerberus
- contagion → Computer Virus Is Biological Infection
- ecology → Ecological Arms Race
- architecture-and-building → Firewall
- physical-security → Security Violations Are Trespassing
- mythology → Trojan Horse
- social-dynamics → Zero Trust