Comprehensive network security approach: security breaches at retail company-a case study

The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line busines...

Full description

Saved in:
Bibliographic Details
Main Authors: Jahanirad, M., Yahya, A.L.N., Noor, R.M.
Format: Article
Language:English
Published: 2012
Subjects:
Online Access:http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf
http://eprints.um.edu.my/4798/
http://paper.ijcsns.org/07_book/201208/20120819.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.um.eprints.4798
record_format eprints
spelling my.um.eprints.47982013-02-13T01:35:55Z http://eprints.um.edu.my/4798/ Comprehensive network security approach: security breaches at retail company-a case study Jahanirad, M. Yahya, A.L.N. Noor, R.M. T Technology (General) The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches. 2012 Article PeerReviewed application/pdf en http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf Jahanirad, M. and Yahya, A.L.N. and Noor, R.M. (2012) Comprehensive network security approach: security breaches at retail company-a case study. International Journal of Computer Science and Network Security, 12 (8). p. 107. http://paper.ijcsns.org/07_book/201208/20120819.pdf
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Research Repository
url_provider http://eprints.um.edu.my/
language English
topic T Technology (General)
spellingShingle T Technology (General)
Jahanirad, M.
Yahya, A.L.N.
Noor, R.M.
Comprehensive network security approach: security breaches at retail company-a case study
description The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches.
format Article
author Jahanirad, M.
Yahya, A.L.N.
Noor, R.M.
author_facet Jahanirad, M.
Yahya, A.L.N.
Noor, R.M.
author_sort Jahanirad, M.
title Comprehensive network security approach: security breaches at retail company-a case study
title_short Comprehensive network security approach: security breaches at retail company-a case study
title_full Comprehensive network security approach: security breaches at retail company-a case study
title_fullStr Comprehensive network security approach: security breaches at retail company-a case study
title_full_unstemmed Comprehensive network security approach: security breaches at retail company-a case study
title_sort comprehensive network security approach: security breaches at retail company-a case study
publishDate 2012
url http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf
http://eprints.um.edu.my/4798/
http://paper.ijcsns.org/07_book/201208/20120819.pdf
_version_ 1643687416127553536
score 13.214268