An Open System Framework for Reducing Users’ Vulnerabilities
发布时间:2021-05-08 13:30
Network and information security is a critical discipline in both academia and business and is also lucrative for organizations and enterprise IT.Many advanced technologies and latest network security appliances are present in cyberspace today and are often robustly applied in networking ecosystems to provide safeguards against attacks and data breaches.However,network infiltrations by malware and information breaches incidents still occur today despite the applications of these security technol...
【文章来源】:武汉纺织大学湖北省
【文章页数】:65 页
【学位级别】:硕士
【文章目录】:
ABSTRACT
ACKNOWLEDGEMENT
ABBREVIATIONS
1. CHAPTER ONE: INTRODUCTION
1.0. Introduction to the Research Study
1.1. Background of the Study
1.2. Network Security and Information Security
1.3. Example Methods used to Ensure Network Security
i. Firewalls
ii. Email Security
iii. Antivirus and Antimalware Solutions
iv. Network Segmentation
v. Access Control
vi. Web Application Security
vii. Virtual Private Networks
viii. Security Information and Event Management
1.3.1. Some examples of customized rules to alert on event conditions involve userauthentication rules, attacks detected and infections detected
1.3.2 Summary Examples of Attacks/Threats and Vulnerabilities to Network Security
1.3.3. The top vulnerabilities in March 2018 include: (According to the security vendorCenzic)
1.4. Statement of the Problem
1.5. Industry examples of network security breaches compromising information security
1.5.1. Case One: TJX
1.5.2. Case Two: Target
1.5.3 Case Three: Yahoo
1.5.4. Possible Information Security Breach Scenario
1.6. Summary of the Introduction to the Research Study
2. CHAPTER TWO: LITERATURE REVIEW
2.0. Introduction to Literature Review
2.1. Why Literature Review?
2.2. The User as a Vulnerability in a Network Security Environment
2.3. Users – The Weak Link in a Network Security Environment
2.4. Antithesis of users as Weakest Link in a Network Security System
2.5. Open Access System Architectures (OSA)
2.6. The Open Group Architecture Framework (TOGAF)
2.7. Case Studies of TOGAF Developed Systems
2.7.1. Case One: Department of Social Security (DSS – UK)
2.7.2. Case Two: Ministry of Defense UK
2.7.3. Case Three: The Joint Engineering Data Management Information and ControlSystem (JEDMICS)-UK
2.8. Summary of the Literature Review
3. CHAPTER THREE: RESEARCH METHODOLOGY
3.0. Introduction to Research Methodology
3.1. Methodology and the Research Process: Systematic Literature Review
3.2. Research Process
3.2.1. Inclusion and Exclusion Criteria
3.2.2. Research Material Gathering and Critical Assessment of the Research
3.3. Summary of the Research Methodology
4. CHAPTER FOUR: RESULTS AND DISCUSSION
4.0. Introduction to Results and Discussion
4.1. Discussion
4.2. Open Access Architectural Framework for Enhancing Network and Information Securityin Cyberspace
4.3. Evaluating Architectural Elements
4.4. Suggested Elements and Components of an Open Ecosystem Architecture
4.4.1. Open Access Development Architecture and Application Programming Interfaces
4.4.2. Connectors
4.4.3. Development Operations (Dev Ops) Automation Tools and Scripts
4.5. Security Use Cases Enabled by Integrated and Automated Solutions
4.5.1. Improvement Methodologies and Transformation of Endpoint Security
4.5.2. Ensuring the Security of Operational Technology
4.5.3. Unification of Cyber Security Systems
4.5.4. Cloud Security
4.5.5. Coordinated Security Policy Management
4.6. The Open System Architectural Framework for Reducing Users’ Weaknesses In TheNetwork Security Ecosystem
4.7. Importance and Contribution to the Study
4.8. Reliability and Validity
4.9. Summary of the Results and Discussions
5. CHAPTER FIVE: CONCLUSION
5.0. Introduction to the Conclusion of the Research Study
5.1. Conclusion
5.2. Future Research
REFERENCES
本文编号:3175421
【文章来源】:武汉纺织大学湖北省
【文章页数】:65 页
【学位级别】:硕士
【文章目录】:
ABSTRACT
ACKNOWLEDGEMENT
ABBREVIATIONS
1. CHAPTER ONE: INTRODUCTION
1.0. Introduction to the Research Study
1.1. Background of the Study
1.2. Network Security and Information Security
1.3. Example Methods used to Ensure Network Security
i. Firewalls
ii. Email Security
iii. Antivirus and Antimalware Solutions
iv. Network Segmentation
v. Access Control
vi. Web Application Security
vii. Virtual Private Networks
viii. Security Information and Event Management
1.3.1. Some examples of customized rules to alert on event conditions involve userauthentication rules, attacks detected and infections detected
1.3.2 Summary Examples of Attacks/Threats and Vulnerabilities to Network Security
1.3.3. The top vulnerabilities in March 2018 include: (According to the security vendorCenzic)
1.4. Statement of the Problem
1.5. Industry examples of network security breaches compromising information security
1.5.1. Case One: TJX
1.5.2. Case Two: Target
1.5.3 Case Three: Yahoo
1.5.4. Possible Information Security Breach Scenario
1.6. Summary of the Introduction to the Research Study
2. CHAPTER TWO: LITERATURE REVIEW
2.0. Introduction to Literature Review
2.1. Why Literature Review?
2.2. The User as a Vulnerability in a Network Security Environment
2.3. Users – The Weak Link in a Network Security Environment
2.4. Antithesis of users as Weakest Link in a Network Security System
2.5. Open Access System Architectures (OSA)
2.6. The Open Group Architecture Framework (TOGAF)
2.7. Case Studies of TOGAF Developed Systems
2.7.1. Case One: Department of Social Security (DSS – UK)
2.7.2. Case Two: Ministry of Defense UK
2.7.3. Case Three: The Joint Engineering Data Management Information and ControlSystem (JEDMICS)-UK
2.8. Summary of the Literature Review
3. CHAPTER THREE: RESEARCH METHODOLOGY
3.0. Introduction to Research Methodology
3.1. Methodology and the Research Process: Systematic Literature Review
3.2. Research Process
3.2.1. Inclusion and Exclusion Criteria
3.2.2. Research Material Gathering and Critical Assessment of the Research
3.3. Summary of the Research Methodology
4. CHAPTER FOUR: RESULTS AND DISCUSSION
4.0. Introduction to Results and Discussion
4.1. Discussion
4.2. Open Access Architectural Framework for Enhancing Network and Information Securityin Cyberspace
4.3. Evaluating Architectural Elements
4.4. Suggested Elements and Components of an Open Ecosystem Architecture
4.4.1. Open Access Development Architecture and Application Programming Interfaces
4.4.2. Connectors
4.4.3. Development Operations (Dev Ops) Automation Tools and Scripts
4.5. Security Use Cases Enabled by Integrated and Automated Solutions
4.5.1. Improvement Methodologies and Transformation of Endpoint Security
4.5.2. Ensuring the Security of Operational Technology
4.5.3. Unification of Cyber Security Systems
4.5.4. Cloud Security
4.5.5. Coordinated Security Policy Management
4.6. The Open System Architectural Framework for Reducing Users’ Weaknesses In TheNetwork Security Ecosystem
4.7. Importance and Contribution to the Study
4.8. Reliability and Validity
4.9. Summary of the Results and Discussions
5. CHAPTER FIVE: CONCLUSION
5.0. Introduction to the Conclusion of the Research Study
5.1. Conclusion
5.2. Future Research
REFERENCES
本文编号:3175421
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/3175421.html