Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
Data and network security analysis are essential for ensuring the integrity, confidentiality, and availability of organizational data. Among the various threats, sniffing attacks—where malicious actors intercept and monitor data transmitted over a network—pose a significant risk to data security....
保存先:
主要な著者: | , , , , |
---|---|
フォーマット: | 論文 |
言語: | English |
出版事項: |
INTI International University
2024
|
主題: | |
オンライン・アクセス: | http://eprints.intimal.edu.my/2022/1/jods2024_41.pdf http://eprints.intimal.edu.my/2022/ http://ipublishing.intimal.edu.my/jods.html |
タグ: |
タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
|
要約: | Data and network security analysis are essential for ensuring the integrity, confidentiality, and
availability of organizational data. Among the various threats, sniffing attacks—where malicious
actors intercept and monitor data transmitted over a network—pose a significant risk to data
security. This study analyzes the network security performance of the IT Service Department of
PT—Palembang, focusing on the impact of sniffing attacks and the effectiveness of
countermeasures. The research involves a comprehensive evaluation of the existing security
infrastructure, testing for vulnerabilities to sniffing attacks, and implementing advanced security
mechanisms. These mechanisms include encryption protocols, network segmentation, and
intrusion detection systems. The analysis assesses the performance of these countermeasures in
mitigating risks and enhancing overall network security. Findings from this study reveal that the
proper implementation of security mechanisms significantly reduces the risk of sniffing attacks.
Encryption ensures the confidentiality of transmitted data, network segmentation limits
unauthorized access, and intrusion detection systems provide real-time threat identification.
Additionally, the research highlights the importance of proactive measures, such as training IT
staff on security best practices and implementing enhanced real-time monitoring systems. This
study not only evaluates the technical aspects of network security but also provides actionable
recommendations for sustainable improvements. By addressing both current vulnerabilities and
future preparedness, the analysis underscores the critical role of a multi-layered security approach
in safeguarding organizational data |
---|