scholarly journals Georgia Tech Information Security Center Hands-On Network Security Laboratory

2006 ◽  
Vol 49 (1) ◽  
pp. 82-87 ◽  
Author(s):  
R.T. Abler ◽  
D. Contis ◽  
J.B. Grizzard ◽  
H.L. Owen
2016 ◽  
Vol 2 (4) ◽  
pp. 428
Author(s):  
Sufyan T. Al-Janabi

Information security now is considered to be cross-disciplinary and comprehensive field. It integrates the accumulation of knowledge in many disciplines like computer science, mathematics, communications, electronics, physics, etc. Thus, there has been an ongoing effort to improve the experiences in information security experimentation. Many international institutions are investigating enhanced approaches to provide hands-on learning and research environments. However, academic institutions are facing with the difficult challenge of providing lab infrastructuresthat meet the increasingly growing needs of cybersecurity training. In this paper, we report on the necessity and importance of building an effective national testbed for cybersecurity experimentation. We also present a general top-level architecture for this testbed emphasizing the most important enabling technologies.


Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.


2014 ◽  
Vol 602-605 ◽  
pp. 2134-2137
Author(s):  
De Feng Chen ◽  
Wen Yan Zhang ◽  
Zhi Bin Yang

Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.


2019 ◽  
Vol 1 (2) ◽  
pp. 15
Author(s):  
Huang Jie

Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.


From old times, information security has been an essential part of human life. Day to day developing new technologies and increasing number of users share information with each other, securing information is becoming more important. For securing information, there are several techniques out of which most common is cryptography. Cryptography is a technique involving securing transmission of messages in presence of adversaries. The basic aim is to hide the information from unauthorized users. Cryptography includes to phases: encryption of plain message and decrypting encrypted message. The aim of this paper is to use new integral transform "Kamal transform" and congruence modulo operator involving ASCII value for encryption and decryption of message.


Author(s):  
Yumo Wang ◽  
Qinghua Zhang

Abstract During the digital development process, enterprises have accumulated a lot of network asset including hardware, software and websites. Effective management of network asset can reduce the internet risk. Network asset is the primary object of information security. Therefore, the essential content of enterprise information security operation is ensuring the security of network assets sufficiently. This paper has investigated researches about detection, management and applications of network assets. The difficulty and current solutions have been summarized by the review. Moreover, this paper puts forward a solution of network asset management according to the bank situation.


Author(s):  
Yin Pan ◽  
Bo Yuan ◽  
Sumita Mishra

As people increasingly rely on computer systems and networks for services such as online banking, online shopping, and socialization, information security for identity protection and privacy has become more important today than ever. Businesses and organizations are also obligated to provide such security to comply with state and federal laws and regulations. Managing security risks and ensuring compliance with information security regulations and industry standards have become important for businesses and organizations. Security auditing is an effective process to assess policies, procedures, and controls in identifying risks associated with networks and various operating systems. This chapter emphasizes network security audits and discusses various auditing procedures and technologies to identify and examine threats and vulnerabilities in computer networks, and to determine how to assess and manage risk posed to a network.


2022 ◽  
pp. 273-287
Author(s):  
Zouheir Trabelsi ◽  
Margaret McCoey ◽  
Yang Wang

This chapter identifies and discusses the learning outcomes to be achieved because of hands-on lab exercises using ethical hacking. It discusses the ethical implications associated with including such labs in the information security curriculum. The discussion is informed by analyses of log data on student malicious activities, and the results of student surveys. The examination of student behavior after acquiring hands-on offensive skills shows that there is potentially a high risk of using these skills in an inappropriate and illegal manner. While acknowledging the risk and the ethical problems associated with teaching ethical hacking, it strongly recommends that information security curricula should opt for a teaching approach that offers students both offensive hands-on lab exercises coupled with ethical practices related to the techniques. The authors propose steps to offer a comprehensive information security program while at the same time minimizing the risk of inappropriate student behavior and reducing institutional liability in that respect and increasing the ethical views and practices related to ethical hacking.


2013 ◽  
Vol 756-759 ◽  
pp. 3016-3020
Author(s):  
Song Ai Liu ◽  
Yi Zhuo Guo ◽  
Xiao Qi Yin

The paper introduces a device linkage system on firewall between the network side and the switch side of user host, and introduces the audit system connected in parallel between the hubs and switches. Then, the paper introduces a method based on HTTP packet recognition network security device linkage, which is a technology of information security intrusion detection and prevention based on the network. It is mainly used to solve the existing network security equipment linkage blocking technology limitation poor problem. Finally, the test result shows that the method is practical and effective.


Sign in / Sign up

Export Citation Format

Share Document