Information assurance security framework for enterprise networks

被引:0
作者
Kesari, MD [1 ]
Velayutham, T [1 ]
Sudarsan, SD [1 ]
Jagadhane, M [1 ]
Sailaja, U [1 ]
机构
[1] Bharat Elect Ltd, Cent Res Lab, Bangalore 13, Karnataka, India
来源
SAM '05: Proceedings of the 2005 International Conference on Security and Management | 2005年
关键词
information assurance; log analysis; security framework;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today Networks play a vital role and act as the information center of industries, enterprises and organizations of Civilian and Defense sectors. The networks are helping to transfer vital and often highly sensitive information while ordinary users are also connected to access network. Protecting the information of an enterprise is a must in the competitive world of information age. With the growing network size and complexity, their protection from threats has become increasingly difficult. The problem with network security solutions is that technology driven, non-integrated products such as firewalls and intrusion detectors provide only protection for specific type of threats. But the need for the organization today is comprehensive coverage of threats to their enterprise networks. Individual security products often lack inter-operability, scalability and ease of manageability. So a holistic security management and centralized control solution that integrates and manages the different security appliances is required for enterprise networks. This paper offers implementation of such solution for information security management. In any organization information assurance is very much important. It requires integrity of the network system with respect to security appliances of different varieties in the network. Information assurance also requires centralized log gathering and analysis for getting unified view, which will make monitoring and troubleshooting easier. Centralized log analysis helps in timely situation awareness with respect to organizational policy implementation. This will also help in easy classification of the policy violations caused either by the known source (administrators) or external malicious users, thus providing the information assurance to the organization.
引用
收藏
页码:180 / 184
页数:5
相关论文
共 50 条
  • [11] Towards Confirming an Information Assurance Framework for eGovernment in Indonesia
    Utomo, Rio Guntur
    Wills, Gary B.
    Walters, Robert J.
    2018 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS), 2018, : 81 - 86
  • [12] Developing a framework to improve information assurance battlespace knowledge
    Bryant, Adam
    Grimaila, Michael
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 17 - 24
  • [13] A Fuzzy Logic Utility Framework (FLUF) to Support Information Assurance
    Newcomb, E. Allison
    Hammell, Robert J., II
    SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS, 2016, 654 : 33 - 48
  • [14] An Applied Methodology for Information Security and Assurance: A Study Case for Cloud Computing
    Villalon-Fonseca, Ricardo
    Solano-Rojas, Braulio J.
    Marin-Raventos, Gabriela
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 432 - 439
  • [15] Research On Information Security Management Mechanism Of The Industry Cloud In Manufacturing Enterprise
    Ping, Ma
    Qiang, Han
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 5282 - 5286
  • [16] INFORMATION SECURITY TRADES IN TACTICAL WIRELESS NETWORKS
    Kurdziel, Michael T.
    Alvermann, John A.
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2015, 2015, 9497
  • [17] The Need, Use and Efficiency of Trustworthy Security Model in Cloud Computing for Information Assurance
    Bhamidipati, Kishore
    Shyam, Karanth S.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 69 - 73
  • [18] Integrating Information Assurance and Security into IT Education: A Look at the Model Curriculum and Emerging Practice
    Dark, Melissa
    Ekstrom, Joseph
    Lunt, Barry
    JOURNAL OF INFORMATION TECHNOLOGY EDUCATION-RESEARCH, 2006, 5 : 389 - 403
  • [19] Privacy Preserving Security Framework for Cognitive Radio Networks
    Kim, Hyunsung
    IETE TECHNICAL REVIEW, 2013, 30 (02) : 142 - 148
  • [20] A standard compliant security framework for IEEE 802.15.4 networks
    Piro, G.
    Boggia, G.
    Grieco, L. A.
    2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 27 - 31