On Scalability and Modularisation in the Modelling of Network Security Systems

Author(s):  
João Porto de Albuquerque ◽  
Heiko Krumm ◽  
Paulo Lício de Geus
Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Peik Astrom

Network security is defined as “a set of procedures, practices and technologies for protecting network servers, network users and their surrounding organizations” (Oppliger, 2000, Preface). The need for network security is caused by the introduction of distributed systems, networks, and facilities for data communication. Improved network security is required because of the rapid development of communication networks. Network security is achieved by using software based tools, that is, network security software (Pulkkis, Grahn & Åström, 2003).


2014 ◽  
Vol 1 (3) ◽  
pp. 1-20
Author(s):  
Soumyo D. Moitra

Estimating the benefits of network security systems is important for security decisions since considerable resources are spent on them and organizations need to know the returns on their investments. The objective of the model presented here is to improve management decisions. Better decisions imply greater security for the budget. This model has a number of novel features such as a probabilistic sub-model for the detection and response process, a new attack/damage matrix based on damage-type and cyber-attacks by category, and extensive sensitivity analyses. The results suggest a number of insights into the factors affecting the benefits from sensors such as the effects of non-linear relationships between the rate of attacks and the damages caused. The key role of the value of sensitive information is identified. The model helps identify the conditions under which a new security system provides enough benefits to justify its purchase.


2020 ◽  
Vol 8 (1) ◽  
Author(s):  
Sari Dewi

AbstractSistem Keamanan Jaringan semakin berkembang seiring dengan perkembangan  teknologi. Instansi - instansi sudah melakukan komputerisasi, dimana setiap bagian di dalam instansi tersebut sudah menggunakan komputer dalam operasionalnya, hal ini membuat instansi pemerintahan meningkatkan kualitas dan kuantitas sistem teknologi informasi. Dengan adanya komputerisasi di pemerintahan perlu adakannya Sistem Keamanan Jaringan yang baik, agar pertukaran data dari kantor kabupaten ke kantor desa dapat dilakukan secara aman dan terkendali. Berbagai software sudah bisa mengatasi permasalahaan tersebut, akan tetapi dari segi keamanan data itu sendiri yang masih sangat dikhawatirkan kebocoran datanya, oleh karena itu dengan menggunakan teknologi VPN dengan metode PPTP sangat cocok digunakan untuk mengamankan pertukaran data, karena proses kerja VPN yaitu dengan membuat jaringan sendiri yang sifatnya rahasia dengan menggunakan IP Publik, membuat keamanan data lebih terjaga kerahasiaannya dan mencegah kebocoran data oleh pihak-pihak yang tidak bertanggung jawab. Keywords: VPN, PPTP, Keamanan Jaringan, mikrotik, Data. AbstractNetwork Security Systems are increasingly developing along with technological developments. Agencies have done computerization, where every part in the agency has used computers in its operations, this has made government agencies improve the quality and quantity of information technology systems. With computerization in government it is necessary to have a good Network Security System, so that data exchange from district offices to village offices can be done safely and in a controlled manner. Various software can overcome these problems, but in terms of data security itself that is still very much concerned about data leakage, therefore using VPN technology with PPTP method is very suitable to be used to secure data exchange, because the VPN work process is to create its own network which is confidential by using Public IP, makes data security more confidential and prevents data leakage by irresponsible parties.Keywords: VPN, PPTP, Network Security, proxy, Data.


2008 ◽  
pp. 1339-1348
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Peik Astrom

Network security is defined as “a set of procedures, practices and technologies for protecting network servers, network users and their surrounding organizations” (Oppliger, 2000, Preface). The need for network security is caused by the introduction of distributed systems, networks, and facilities for data communication. Improved network security is required because of the rapid development of communication networks. Network security is achieved by using software based tools, that is, network security software (Pulkkis, Grahn & Åström, 2003).


Sign in / Sign up

Export Citation Format

Share Document