Importance of Information and Network Security: Evaluation within the Scope of Business
Abstract views: 41 / PDF downloads: 30
Keywords:
Business, Information Security, Security networkAbstract
From past to present, security has played an important role in every aspect of life. With the rapid
development of computer technology, different problems and solutions have emerged in the field of
security. Previously, organizations and companies only had their own local networks, but due to the need
for communication between these organizations, networks have expanded further and security has become
very important in parallel. Security has emerged to prevent external attacks or damages caused by user
errors on these computer networks, wired, wireless networks and the internet used by organizations.
Wireless networks provide significant advantages thanks to various benefits such as easy use and flexibility.
However, they also have several disadvantages compared to a wired network. Security risks are at the top
of these disadvantages. In order to ensure that the security of this network, which emerges entirely from the
requirements, is provided correctly, it is necessary to evaluate, analyze and analyze the information security
risks of network policies. This analysis and evaluation is done according to certain criteria. Accordingly,
in this research, in the light of these criteria, evaluations, network security policies, determination and
analysis of information security risks related to security policies are included in the direction of providing
network security for businesses and institution
Downloads
References
Amin, S., Schwartz, G. A. and Shankar Sastry, S. (2013). Security of interdependent and identical networked control systems. Automatica, 49(1), 186–192.
Antsaklis, P. and Baillieul, J. (2007). Special issue on technology of networked control systems. Proceedings of the IEEE, 95(1), 5–8.
Bace, R. and Mell. P. (2001). NIST special publication on intrusion detection systems. SP-800-31. National Institute of Standards and Technology.
Barman, S. (2001). Writing Information Security Policies, Sams Publishing, 240 pages.
Bier, V., Oliveros, S. and Samuelson, L. (2007). Choosing what to protect: strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9(4), 563–587.
Böhme, R. and Schwartz, G. A. (2010). Modeling cyber-insurance: towards a unifying framework. In Proc. of the ninth workshop on the economics of information security. WEIS. Cambridge, MA, USA, June.
Cárdenas, A. A., Amin, S. and Sastry, S. S. (2008). Research challenges for the security of control systems. In Proc. of the 3rd USENIX workshop on hot topics in security. HotSec. San Jose, CA, USA.
Fakhravar, D., Khakzad, N., Reniers, G. and Cozzani, V. (2017). Security vulnerability assessment of gas pipelines using Discrete-time Bayesian network. Process Safety and Environmental Protection, 111, 714–725. doi:10.1016/j.psep.2017.08.036
Hamed, H. and Al-Shaer, E. (2006). Taxonomy of conflicts in network security policies. IEEE Communications Magazine, 44(3), 134–141.
Han, W. and Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.
Heal, G. and Kunreuther, H. (2003). Interdependent security. Journal of Risk and Uncertainty, 26(2–3), 231–249.
How to Accurately Define the Scope of an Information Security Assessment, 2017 https://kirkpatrickprice.com/webinars/how-to-accurately-define-the-scope-of-an-information-security-assessment/
Lelarge, M. and Bolot, J. (2008). Network externalities and the deployment of security features and protocols in the Internet. SIGMETRICS Performance Evaluation Review, 36(1), 37–48.
Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L. and Vasilakos, T. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299. doi:10.1016/j.ins.2015.08.019
Levy, J., Tran, K., Lydon, P., Pollock, J., Parry, D., Weigand, S., Zhong Chen, Z., Ha, H., Gmuender, J. and Massing, M. (2007). Chapter 3 - Creating and Defining a Network Security Policy, Editor(s): Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Dave Parry, Susan Weigand, Zhong Chen, Hung Ha, John Gmuender, Mike Massing, In SonicWALL Secure Wireless Network Integrated Solutions Guide, Syngress, 55-78, Elsevier Inc.
Network Security Assessments: Importance and Best Practices,2023 https://www.atiba.com/network-security-assessment/ (Access date: 12.04.2024)
Network Infrastructure What Is a Network Security Assessment?, https://kirbtech.com/network-assessments-explained/ (Access date: 15.05.2024)
Shang, F., Li, Y., Fu, Q., Wang, W., Feng, J. and He, L. (2018). Distributed controllers multi-granularity security communication mechanism for software-defined networking. Computers & Electrical Engineering, 66, 388–406.
Stajano, F. and Anderson, R. (1999). The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks, Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1-11.
Stallings, W. (2002). Wireless Communications and Networking, Prentice Hall, 598 pages
Weiss, J.D. (1991). A System Security Engineering Process. In Proceedings of the 14th National Computer Security Conference, Washington, DC.
Yang, H., Luo, H.Y, Ye, F., Lu, S W. and Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications. 11 (1), 38-47.
Zhou, L. and Haas, Z. J. (1999). Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security November/December, 24-30.