Open Access Open Access  Restricted Access Subscription Access

Providing Efficient INS for Corporate Networks


Affiliations
1 Dept. of ISE, SJBIT, Bangalore, India
 

Security continues to be an issue for organizations. Good information security is a mix of physical security, computer security, network security, backups, anti-virus software, firewalls, authentication methods, intrusion detection, confidentiality, integrity, availability, etc., Risk is the combination of threat and vulnerability. This paper deals with Information security in particular and concentrates on corporate networks. Threats without vulnerabilities pose no risk. Likewise, vulnerabilities without threats pose no risk. A secure system should still permit authorized users to carry out legitimate and useful tasks. It might be possible to secure a computer system against misuse using extreme measures. Most computer systems cannot be made secure even after the application of extensive "computer security" measures. Further more, if they are secure then functionality and ease of use often decreases. The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. One technique enforces the principle of least privilege to great extent is even if an attacker gains access to one part of the system, fine-grained security ensures that it is just as difficult for them to access the rest. Further more, by breaking the system up into smaller components; the complexity of individual components is reduced. Most of the time people concentrate on coming out with efficient algorithms to analyze, process data. But not much importance is given to ensure data integrity, security, privacy, etc.
User
Notifications
Font Size

  • Eric Maiwald, “Fundamentals of Network Security”, Dreamtech New Delhi 2004. Pp.4-29, 46-59, 178-189
  • William Stallings, “Cryptography and Network Security principles and practices”, second edition, Delhi, 2002 pp.4-11
  • Roberta Bragg, Mark Rhodes-ousley, Keith Strassberg, “Network security”, TataMc-GrawHill, New Delhi, 2004, pp.9-14
  • William Stallings, “Network Security essentials applications and standards”, Pearson Education, Delhi, pp.101-172
  • S. Babu, L. Subramanian and j. Windom, “A data stream Management system for network traffic Management”, proc. Workshop Network Related data management 2001.
  • A. Feldman, A. Greenberg, C. Lund, N.Reingold, J. Rexford, and F. True, “Deriving traffic demands for operational IP Networks:Methodology and Experience”, IEEE/ACM Trans. Networking, 2001, pp.265-279
  • Douglas E. Comer, “Internetworking with TCP/IP Principles, protocols, and Architectures”, Volume1, Pearson, New Delhi, 2006, pp.1-9
  • Steven Alter, “Information systems The Foundation of EBusiness”, Fourth edition, Pearson Education, New Delhi. Pp.543559
  • Modelling of E-Governance Framework for Mining Knowledge from Massive Grievance Redressal Data, G Sangeetha, LM Rao -International Journal of Electrical and Computer Engineering (IJECE), 2016
  • ‘Sustaining value maximization in entrepreneurship through ethics’ published in AJMR-Refereed International Journal of management, September-2008

Abstract Views: 373

PDF Views: 170




  • Providing Efficient INS for Corporate Networks

Abstract Views: 373  |  PDF Views: 170

Authors

V. Kiran Kumar
Dept. of ISE, SJBIT, Bangalore, India
Fazal Mahemood
Dept. of ISE, SJBIT, Bangalore, India
N. Usha
Dept. of ISE, SJBIT, Bangalore, India

Abstract


Security continues to be an issue for organizations. Good information security is a mix of physical security, computer security, network security, backups, anti-virus software, firewalls, authentication methods, intrusion detection, confidentiality, integrity, availability, etc., Risk is the combination of threat and vulnerability. This paper deals with Information security in particular and concentrates on corporate networks. Threats without vulnerabilities pose no risk. Likewise, vulnerabilities without threats pose no risk. A secure system should still permit authorized users to carry out legitimate and useful tasks. It might be possible to secure a computer system against misuse using extreme measures. Most computer systems cannot be made secure even after the application of extensive "computer security" measures. Further more, if they are secure then functionality and ease of use often decreases. The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. One technique enforces the principle of least privilege to great extent is even if an attacker gains access to one part of the system, fine-grained security ensures that it is just as difficult for them to access the rest. Further more, by breaking the system up into smaller components; the complexity of individual components is reduced. Most of the time people concentrate on coming out with efficient algorithms to analyze, process data. But not much importance is given to ensure data integrity, security, privacy, etc.

References