Comprehensive network security approach: security breaches at retail company-a case study
The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line busines...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf http://eprints.um.edu.my/4798/ http://paper.ijcsns.org/07_book/201208/20120819.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.4798 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.47982013-02-13T01:35:55Z http://eprints.um.edu.my/4798/ Comprehensive network security approach: security breaches at retail company-a case study Jahanirad, M. Yahya, A.L.N. Noor, R.M. T Technology (General) The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches. 2012 Article PeerReviewed application/pdf en http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf Jahanirad, M. and Yahya, A.L.N. and Noor, R.M. (2012) Comprehensive network security approach: security breaches at retail company-a case study. International Journal of Computer Science and Network Security, 12 (8). p. 107. http://paper.ijcsns.org/07_book/201208/20120819.pdf |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Jahanirad, M. Yahya, A.L.N. Noor, R.M. Comprehensive network security approach: security breaches at retail company-a case study |
description |
The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches. |
format |
Article |
author |
Jahanirad, M. Yahya, A.L.N. Noor, R.M. |
author_facet |
Jahanirad, M. Yahya, A.L.N. Noor, R.M. |
author_sort |
Jahanirad, M. |
title |
Comprehensive network security approach: security breaches at retail company-a case study |
title_short |
Comprehensive network security approach: security breaches at retail company-a case study |
title_full |
Comprehensive network security approach: security breaches at retail company-a case study |
title_fullStr |
Comprehensive network security approach: security breaches at retail company-a case study |
title_full_unstemmed |
Comprehensive network security approach: security breaches at retail company-a case study |
title_sort |
comprehensive network security approach: security breaches at retail company-a case study |
publishDate |
2012 |
url |
http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf http://eprints.um.edu.my/4798/ http://paper.ijcsns.org/07_book/201208/20120819.pdf |
_version_ |
1643687416127553536 |
score |
13.211869 |