Security measures in a secure computer communications architecture

被引:0
|
作者
Bottino, Louis J.
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Architecture of a Computer Communication System has evolved with advances in technology. Changes to satisfy telecommunication needs within the technical community have surfaced gradually through the efforts of international computer standards organizations, technical panels, and guidance committees. The design of a secure Computer Communications Architecture to protect the integrity of information exchange is pursued by the aerospace industry, the commercial and financial sectors, and at all levels of government agencies. Banking institutions, the insurance and medical professions, goods and commodity exchanges, the airline industry, and local, state, and federal government agencies have all sought increased computer security and confidence in their computer communications. * Computer security techniques, defense methodologies, and security appliances are discussed and analyzed. These discussions will center on various computer and network security devices. With these devices, the foundations for a rigorous security policy can be created. Security policies are important in preventing compromises of network security and threats affecting secure computer communications. Vulnerabilities in computer networks are identified in terms of exploits. The deployment of scanning technologies can discover these exploits and their affects on the integrity of the information exchanged. These same technologies can assign risk factors and pose suggestions for corrective actions in the computer environment. A firewall system installation is deployed on the network of the enterprise to protect and secure a computer communications architecture. Intrusion detection techniques include signature identification of the intruder to locate and respond to network and host-based intruder attacks. Some of these same techniques will uncover the forensic evidence and explain how the computer or network system was compromised. Virtual Private Networks (VPNs) are another example of a security appliance. This network device employs security mechanisms such as tunneling, Internet Protocol (IP) Security Protocols and cryptography. Insecure computer communications can have devastating consequences on national security, which would affect every aspect of daily life. To address the issue a secure computer communications architecture will be offered as an example to demonstrate the precautions that can be taken, display the benefits from a systems engineering viewpoint and present an economic feasibility with a view towards the future.
引用
收藏
页码:1078 / 1095
页数:18
相关论文
共 50 条
  • [21] Security Architecture and Protocols for Secure MQTT-SN
    Park, Chang-Seop
    Nam, Hye-Min
    [J]. IEEE ACCESS, 2020, 8 : 226422 - 226436
  • [22] Security Architecture for Secure Train Control and Monitoring System
    Purwanto, Yudha
    Ruriawan, Muhammad Faris
    Alamsyah, Andry
    Wijaya, Febry Pandu
    Husna, Dewi Nala
    Kridanto, Agri
    Nugroho, Fifin
    Fakhrudin, Anang
    Itqon, Mu'ammar
    Febrianta, Mochamad Yudha
    Widiyanesti, Sri
    Mentari, Fussy
    Gozali, Alfian Akbar
    Romadhony, Ade
    [J]. SENSORS, 2023, 23 (03)
  • [23] Motorola's security measures aid emergency communications
    不详
    [J]. MICROWAVES & RF, 2003, 42 (09) : 28 - 28
  • [24] Spread-photon architecture for quantum-secure communications
    Bullock, Michael S.
    Webb, Wesley
    Knarr, Samuel H.
    Burt, Timothy C.
    Drakes, James A.
    Bucklew, Victor G.
    Guha, Saikat
    Bash, Boulat A.
    [J]. 2023 IEEE PHOTONICS CONFERENCE, IPC, 2023,
  • [25] Network-centric architecture to enable secure communications and discovery
    Cunningham, D
    Anderson, J
    Medairy, B
    [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3190 - 3196
  • [26] The VIRTUS Middleware: an XMPP based architecture for secure IoT communications
    Conzon, Davide
    Bolognesi, Thomas
    Brizzi, Paolo
    Lotito, Antonio
    Tomasi, Riccardo
    Spirito, Maurizio A.
    [J]. 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [27] Design of Secure Connectors for Complex Message Communications in Software Architecture
    Shin, Michael
    Kang, Taeghyun
    Gomaa, Hassan
    [J]. ESSE 2021: THE 2ND EUROPEAN SYMPOSIUM ON SOFTWARE ENGINEERING, 2021, : 21 - 28
  • [28] A secure architecture for TCP/UDP-based cloud communications
    Abu Faisal
    Mohammad Zulkernine
    [J]. International Journal of Information Security, 2021, 20 : 161 - 179
  • [29] A Name-Based Secure Communications Architecture for Vehicular Networks
    Papadopoulos, Christos
    Afanasyev, Alexander
    Shannigrahi, Susmit
    [J]. 2021 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2021, : 178 - 181
  • [30] A key management architecture and protocols for secure smart grid communications
    Long, Xuelian
    Tipper, David
    Qian, Yi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3602 - 3617