Comprehensive network security approach: security breaches at retail company-a case study

The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line busines...

Full description

Saved in:
Bibliographic Details
Main Authors: Jahanirad, M., Yahya, A.L.N., Noor, R.M.
Format: Article
Language:English
Published: 2012
Subjects:
Online Access:http://eprints.um.edu.my/4798/1/comprehensive_Network_Security_Approach_Security_Breaches_at_Retail_Company_a_Case_Study.pdf
http://eprints.um.edu.my/4798/
http://paper.ijcsns.org/07_book/201208/20120819.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaya
Language: English
Description
Summary:The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency advantages, without the comprehensive network security plan an online retail company which operates with information systems about its daily businesses, increases its risk to become vulnerable to security breaches. The purpose of this article is to introduce a comprehensive network security approach for an online retail company which suffers from security breaches. This article begins with the brief introduction about the problem statement and the proposed method to complete the security enhancement. Next, an ideal network architecture suggested, using both basic network diagram and security enhancement network diagram. The recent task will be continued by implementing the security and password policies to the network. Finally the whole procedure will be simulated and examined using Cisco Packet Tracer Experiment. The simulation results show that the approach was successful in designing a comprehensive network security, and to defend the company against security breaches.