Comprehensive Network Security Approach: Security Breaches at Retail company-A Case Study

被引:0
|
作者
Jahanirad, Mehdi [1 ]
AL-Nabhani, Yahya [1 ]
Noor, Rafidah Md. [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches.
引用
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [1] A Comprehensive Approach for Network Security
    Rm, Manikandan
    Radha, D.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
  • [2] A Novel Comprehensive Network Security Assessment Approach
    Wang, Chunlu
    Wang, Yancheng
    Dong, Yingfei
    Zhang, Tianle
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [3] Company's Data Security - Case Study
    Stera, Piotr
    [J]. COMPUTER NETWORKS, 2010, 79 : 290 - 296
  • [4] A comprehensive approach to security
    Wagner, David
    [J]. MIT SLOAN MANAGEMENT REVIEW, 2007, 48 (04) : 8 - 8
  • [5] The East India Company-A Case Study in Corporate Governance
    Seth, Vijay K.
    [J]. GLOBAL BUSINESS REVIEW, 2012, 13 (02) : 221 - 238
  • [6] Hierarchical approach to analyzing security breaches in information systems
    Pavlenko E.Y.
    Yarmak A.V.
    Moskvin D.A.
    [J]. Automatic Control and Computer Sciences, 2017, 51 (8) : 829 - 834
  • [7] Case Study: Information Flow Resilience of a Retail Company with Regard to the Electricity Scenarios of the Sicherheitsverbundsubung Schweiz (Swiss Security Network Exercise) SVU 2014
    Leu, Patrick O.
    Peter, Daniel
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 159 - 170
  • [8] How Good is a Security Policy against Real Breaches? A HIPAA Case Study
    Kafali, Ozgur
    Jones, Jasmine
    Petruso, Megan
    Williams, Laurie
    Singh, Munindar P.
    [J]. 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 530 - 540
  • [9] The Docker Security Playground: a hands-on approach to the study of Network Security
    Perrone, G.
    Romano, S. P.
    [J]. 2017 PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS (IPTCOMM), 2017,
  • [10] A Comprehensive Approach for Validation of Air Traffic Management Security Prototypes A Case Study
    Stelkens-Kobsch, Tim H.
    Finke, M.
    Carstengerdes, N.
    [J]. 2017 IEEE/AIAA 36TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2017,