Font Size: a A A

The Methodology&Strategy For Building An Efficient Security System

Posted on:2013-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:Nathaniel AshonFull Text:PDF
GTID:2248330374989577Subject:Computer Applications and Technology
Abstract/Summary:PDF Full Text Request
Information and Network security is currently one of the key concerns of every responsible organization. Enterprises today are facing security threats that would have been unimaginable only a few years ago. With the emergence of the internet, the proliferation of software applications and the ingenuity of hackers, security has become a complex problem and it requires a well-planned security solution to combat it effectively.To ensure the information of an entire network system is secured, a specific methodology needs to be adopted which is capable and effective enough to provide a complete security solution. Bearing this in mind, this paper touches on the various security threats, security services, current network security solutions, cryptography and encryption, authentication, internet security and IP Security in particular as the future of information security duel on it but most importantly focuses into detail a methodology for defining an efficient information security system. My research proposes a model which provides a proactive strategy, contingency plan and a reactive strategy various forms of organizations can adhere to, to annul information security challenges and threats. The proactive strategy analyzes predefined steps to be taken to prevent attacks from occurring and also focuses on how an attack could possibly affect a network system and the vulnerabilities it exploits, whiles the reactive strategy is implemented when the proactive strategy has failed.It defines steps to be taken during and after an attack. The contingency plan is just an alternative plan("plan B") that is developed in case an attack on the system damages data or any other assets with the result of halting normal business processes and hurting productivity. Its ultimate goal is to maintain the availability, integrity and confidentiality of data.This research will provide a complete direction and roadmap to aid organizations to acknowledge, analyze, assess, configure and secure their network systems efficiently.
Keywords/Search Tags:information security, IP Security, proactive strategy, reactive strategy, contingency plans
PDF Full Text Request
Related items