Preview

Research Paper on Ns2

Satisfactory Essays
Open Document
Open Document
2840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Paper on Ns2
2009 International Conference on Computer Technology and Development

Security Model Based on Network Business Security
Wu Kehe, Zhang Tong, Li Wei, Ma Gang
Department of Computer Science and Technology North China Electric Power University Beijing, China epuwkh@126.com, zhtzhangtong@163.com, liwei@ncepu.edu.cn, hdmagang@163.com

Abstract—Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the "network business security" concept. In this paper, the object of data information security is defined in three parts security, network system security and network business security, and the network business security model is described. The proposal of the concept "network business security" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system. Keywords-Information Security, Network Business Security, Network Business Security Model

I.

INTRODUCTION

Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security



References: [1] YuNing Wang. Current Situation and Defense of Network Information Security[J]. Modern Commerce Industry , 2008 [2] DongHui Jiang. Security Offense and Defense Testing and Analysis of LAN[J]. Science&Technology Information, 2009 [3] XingHua Chen. Enterprise Network Information Security and Countermeasure Study[J]. Agriculture Network Information ,2009 [4] Chi Hu. Strategy Choice of Enterprise Information Construction.[J]. China Science&Technology Investment,2009 [5] YuanFei Huang, LiYong Ji, LiPing Jin. Investigation of Network Information Security Situation and Hot Issues[J]. Telecommunications Science, 2009 [6] Chao Li. Simple Exploration of Network Information Security[J]. Scientific&Technological Information Development and Economic, 2009 [7] D.E.Bell, L.LaPaDula. Secure Computer Systems: Mathematical Foundations and Model[J]. Technical Report M74 244, Mitre Corp. , Bedford, MA, May 1973. [8] K. J. Biba. Integrity Consideration for Secure Computer Systems[J]. Technical Report ESD-TR-76-372,Mitre Corp. , Bedford, MA, April 1979. [9] Winn Schwartau. Time-Based Security Explained: Provable Security Models and Formulas for the Practitioner and Vendor[J]. Computer&Security, USA, 1998:693~714. [10] HongSheng Yan, XueLi Wang, Jun Yang. Computer Network Security and Defense[M]. Beijing: Electronics Industry Press,2007 [11] R.Sandhu,V.Bhamidipati,E.Coyne. The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline. In Proceedings of Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, 1997:41~49. [12] GuangQiong Wang. Comprehensive Study of Access Control Based on GFAC[J]. Journal of AnQing Teachers College,2004 Figure 1 Existing Theory of Information Security System Figure 2 The Information Security System Based on Data, Network and Network Busine 580 Authorized licensed use limited to: NWFP UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on June 15,2010 at 09:10:07 UTC from IEEE Xplore. Restrictions apply.

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The review of the current information technology security policy was conducted based on the idea of improvement with respect to current technology trends and best practices. An evaluation of the enterprise infrastructure as a whole, as it pertains to information technology security, was also conducted. These evaluations were the starting point for Smith Systems Consulting to design a security strategy to best fit Riordan Manufacturing. The existing security policy consists of location-based data access to on-site servers and on-site access to Unix servers for ERP and MRP systems. Also, it was evident that there are a number of servers and data to be accessed from different operating systems that are deployed throughout the locations. The management of the existing security strategy is one that requires each individual to be assigned access permissions manually throughout their term of employment. This strategy is commonplace in the industry, but requires the IT staff to manage each user individually. Therefore, our results of the evaluation were positive with respect to overall security, but management of the user access is costly and time consuming. With these results in mind, we propose a security policy base on Role Based Access Controls (RBAC).…

    • 892 Words
    • 4 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The Technology is also one of the key factor in information security program as companies carry most of their function electronically which exposes them to many security threats. In this information security program, for an effective architecture we should provide layered security program in order to provide multiple levels of defense. This is firmly known as Defense-in-depth.…

    • 805 Words
    • 4 Pages
    Good Essays

Related Topics