Multiple levels of
information security zones

Data Flow and Security Across Multiple Zones

Consider a scenario similar to the ”Separation between two security zones”, but with more security zones.

The data gathering system is in an open system, but the data is sent to a restricted system, where it is correlated with both open data and restricted data.

Some data is passed on for further analysis to a secret system where further correlations are performed and the results may yield information which may have serious national security impact, so the results are sent to a top secret system for storage.