Feasibility of Network Security Measures in IRAN

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 699

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

RSTCONF01_446

تاریخ نمایه سازی: 30 آبان 1394

چکیده مقاله:

Security systems are designed as a result of a complex process which germinates from what is called is a felt need : need for security which is determined by an amalgam and interface of people, processes, and price, each of which affected by the advancement in technology. Today, a Secure Network is a vital necessity in any industry, institution and business. The velocity and volume of information exchange are mind-boggling. These two characteristics may affect the quality, integrity and reliability of information the results of which could be the escalating fear and uncertainty of users of such information. Business, industry, the defense apparatus, universities and other institutions of learning are concerned with the degree of confidence their clients assign to the information they produce and disseminate, which has persuaded them to invest in the state of the art security systems. As the world of Internet knows no boundaries, advantages and disadvantages as well as problems and solutions in such world are universal. In other words, no institution can assume that it is not a part of this complicated world, and do not equip itself with the best products in securing its information. This study examines the feasibility of network security in large organizations in Iran, in general, and the feasibility of network security in the Agricultural Bank of Iran, in particular. It describes the important measures and the essential steps that have to be taken to properly use a network security system in the Bank. Along these lines, and considering the Iranian environment, the paper presents different scenarios with their advantages and disadvantages

نویسندگان

Sajjad Daliri

Networking Department, Keshavarz Hi-Tec Solution Company, Agricultural Bank of IRAN

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Wuzheng Tan; Maojiang Yang; Feng Ye; Wei -ه1 Ren, A ...
  • A beginner's guide to network security, CISCO (2001), ...
  • http : //www. cisco _ _ m/warp/pub lic/cc/s o/neso/sg ...
  • Al-Akhras, M.A., : "Wireless Network Security Imp lementation in Universities" ...
  • _ Brenton, C. and Hunt, C. (2002): Mastering Network Security, ...
  • - Farrow, R.. Network Security Tools, found at http://sageweb. _ ...
  • Flauzac, O.; Nolot, F.; Rabat, C.; Steffenel, L.- A., "Grid ...
  • Conclusion & Future Work ...
  • Stallings, W. (20 06): Cryptography and Network Security, Fourth Edition, ...
  • Wu Kehe; Zhang Tong; Li Wei; Ma Gang, "Security Model ...
  • B.M. Onimode & K.J. Danjuma (2014). Issues and Challenges of ...
  • Network and System Security, 20 09. NSS '09, pp. Y8-82, ...
  • Importance of Network Security, found at _ ://www.content 4 reprint. ...
  • M. S. Siddiqui, C. S. Hong, "Security issues in wireless ...
  • Marin, G.A. (2005), "Network security basics", In security & Privacy, ...
  • Matt Curtin, Introduction o Network security 1998), ...
  • McClure, S., Scambray J., Kurtz, G. (2009): Hacking Exposed: Network ...
  • Murray, P., Network Security, found at _ : //www .pandc ...
  • نمایش کامل مراجع