Comprehensive Network Security Approach: Security Breaches at Retail company-A Case Study

被引:0
|
作者
Jahanirad, Mehdi [1 ]
AL-Nabhani, Yahya [1 ]
Noor, Rafidah Md. [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches.
引用
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [31] Developing an Information Security Policy: A Case Study Approach
    Alqahtani, Fayez Hussain
    [J]. 4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 : 691 - 697
  • [32] IMMUNE INSPIRED SECURITY APPROACH FOR MANETS: A CASE STUDY
    Mohamed, Yasir Abdelgadir
    [J]. PROCEEDINGS OF THE FOURTH GLOBAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION, 2011, 1337 : 191 - 197
  • [33] Comprehensive Approach to Increase Cyber Security and Resilience
    Choras, Michal
    Kozik, Rafal
    Torres Bruna, Maria Pilar
    Yautsiukhin, Artsiom
    Churchill, Andrew
    Maciejewska, Iwona
    Eguinoa, Irene
    Jomni, Adel
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 686 - 692
  • [34] Comprehensive approach to designing internet security taxonomy
    Abbas, Ali
    El Saddik, Abdulmotaleb
    Miri, Ali
    [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1380 - +
  • [35] The value of the CIO in the top management team on performance in the case of information security breaches
    Humayun Zafar
    Myung S. Ko
    Kweku-Muata Osei-Bryson
    [J]. Information Systems Frontiers, 2016, 18 : 1205 - 1215
  • [36] A comprehensive study on security bug characteristics
    Wei, Ying
    Sun, Xiaobing
    Bo, Lili
    Cao, Sicong
    Xia, Xin
    Li, Bin
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2021, 33 (10)
  • [37] Independent Security Testing on Agile Software Development: a Case Study in a Software Company
    Choliz, Jesus
    Vilas, Julian
    Moreira, Jose
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 522 - 531
  • [38] The value of the CIO in the top management team on performance in the case of information security breaches
    Zafar, Humayun
    Ko, Myung S.
    Osei-Bryson, Kweku-Muata
    [J]. INFORMATION SYSTEMS FRONTIERS, 2016, 18 (06) : 1205 - 1215
  • [39] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [40] Enterprise network security - A new approach
    Skudrna V.J.
    Lou T.M.
    [J]. Journal of Network and Systems Management, 1999, 7 (1) : 5 - 8