Security measures in a secure computer communications architecture

被引:0
|
作者
Bottino, Louis J.
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Architecture of a Computer Communication System has evolved with advances in technology. Changes to satisfy telecommunication needs within the technical community have surfaced gradually through the efforts of international computer standards organizations, technical panels, and guidance committees. The design of a secure Computer Communications Architecture to protect the integrity of information exchange is pursued by the aerospace industry, the commercial and financial sectors, and at all levels of government agencies. Banking institutions, the insurance and medical professions, goods and commodity exchanges, the airline industry, and local, state, and federal government agencies have all sought increased computer security and confidence in their computer communications. * Computer security techniques, defense methodologies, and security appliances are discussed and analyzed. These discussions will center on various computer and network security devices. With these devices, the foundations for a rigorous security policy can be created. Security policies are important in preventing compromises of network security and threats affecting secure computer communications. Vulnerabilities in computer networks are identified in terms of exploits. The deployment of scanning technologies can discover these exploits and their affects on the integrity of the information exchanged. These same technologies can assign risk factors and pose suggestions for corrective actions in the computer environment. A firewall system installation is deployed on the network of the enterprise to protect and secure a computer communications architecture. Intrusion detection techniques include signature identification of the intruder to locate and respond to network and host-based intruder attacks. Some of these same techniques will uncover the forensic evidence and explain how the computer or network system was compromised. Virtual Private Networks (VPNs) are another example of a security appliance. This network device employs security mechanisms such as tunneling, Internet Protocol (IP) Security Protocols and cryptography. Insecure computer communications can have devastating consequences on national security, which would affect every aspect of daily life. To address the issue a secure computer communications architecture will be offered as an example to demonstrate the precautions that can be taken, display the benefits from a systems engineering viewpoint and present an economic feasibility with a view towards the future.
引用
收藏
页码:1078 / 1095
页数:18
相关论文
共 50 条
  • [1] Architecture for secure and private vehicular communications
    Papadimitratos, P.
    Buttyan, L.
    Hubaux, J. -P.
    Kargl, F.
    Kung, A.
    Raya, M.
    [J]. 2007 7TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS, PROCEEDINGS, 2007, : 339 - 344
  • [2] Product spotlight: communications security - the many faces of secure communications
    [J]. Defense and Security Electronics, 1995, 27 (12):
  • [3] Security Architecture for a Secure Database on Android
    Park, Jin Hyung
    Yoo, Seok-Man
    Kim, In Seok
    Lee, Dong Hoon
    [J]. IEEE ACCESS, 2018, 6 : 11482 - 11501
  • [4] Adaptive secure architecture for communications on networked circumstance
    Guo Yuan-bo
    Ma Jian-feng
    Wang Ya-di
    [J]. Proceedings of 2005 Chinese Control and Decision Conference, Vols 1 and 2, 2005, : 1330 - +
  • [5] A Novel Architecture for Secure Communications in Mobile Systems
    Upadhya, Alok
    Sahoo, Jajati Keshari
    Bajpai, Vibhor
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 801 - 805
  • [6] List of criteria for a secure computer architecture
    Podebrad, Igor
    Hildebrandt, Klaus
    Klauer, Bernd
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 76 - +
  • [7] Special Issue on Computer and Communications Security
    Syverson, Paul
    Jha, Somesh
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (01)
  • [8] Special Issue on Computer and Communications Security
    Wright, Rebecca N.
    di Vimercati, Sabrina De Capitani
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (02)
  • [9] Special Issue on Computer and Communications Security
    di Vimercati, Sabrina De Capitani
    Syverson, Paul
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)
  • [10] Security Architecture for Secure Multicast CoAP Applications
    Park, Chang-Seop
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3441 - 3452