Implement host-based boundary protection mechanisms at system components.
Host-based boundary protection mechanisms include host-based firewalls. System components that employ host-based boundary protection mechanisms include servers, workstations, notebook computers, and mobile devices.
host-based boundary protection mechanisms are implemented at system components.
No cross-framework mappings available