Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
Data and network security analysis are essential for ensuring the integrity, confidentiality, and availability of organizational data. Among the various threats, sniffing attacks—where malicious actors intercept and monitor data transmitted over a network—pose a significant risk to data security....
Saved in:
Main Authors: | , , , , |
---|---|
格式: | Article |
语言: | English |
出版: |
INTI International University
2024
|
主题: | |
在线阅读: | http://eprints.intimal.edu.my/2022/1/jods2024_41.pdf http://eprints.intimal.edu.my/2022/ http://ipublishing.intimal.edu.my/jods.html |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
总结: | Data and network security analysis are essential for ensuring the integrity, confidentiality, and
availability of organizational data. Among the various threats, sniffing attacks—where malicious
actors intercept and monitor data transmitted over a network—pose a significant risk to data
security. This study analyzes the network security performance of the IT Service Department of
PT—Palembang, focusing on the impact of sniffing attacks and the effectiveness of
countermeasures. The research involves a comprehensive evaluation of the existing security
infrastructure, testing for vulnerabilities to sniffing attacks, and implementing advanced security
mechanisms. These mechanisms include encryption protocols, network segmentation, and
intrusion detection systems. The analysis assesses the performance of these countermeasures in
mitigating risks and enhancing overall network security. Findings from this study reveal that the
proper implementation of security mechanisms significantly reduces the risk of sniffing attacks.
Encryption ensures the confidentiality of transmitted data, network segmentation limits
unauthorized access, and intrusion detection systems provide real-time threat identification.
Additionally, the research highlights the importance of proactive measures, such as training IT
staff on security best practices and implementing enhanced real-time monitoring systems. This
study not only evaluates the technical aspects of network security but also provides actionable
recommendations for sustainable improvements. By addressing both current vulnerabilities and
future preparedness, the analysis underscores the critical role of a multi-layered security approach
in safeguarding organizational data |
---|