Network Security
Roles: defender, perimeter, threat, traffic, rule, trusted-zone, untrusted-zone
The defense of digital infrastructure through perimeters, access rules, and traffic inspection. Defines space in terms of trust zones separated by controlled boundaries. Structurally interesting because it reveals how security thinking creates binary inside/outside distinctions, and how those distinctions break down as networks become more porous and distributed.
As Target Frame (1)
- architecture-and-building → Firewall