Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency

Today, computer networks attacks have continued to increase in severity and sophistication. Data lost and unavailability of network resources due to attacks from internet have negative financial impact on many companies. Unprotected organisation’s networks from internet attacks face high risk of da...

Full description

Saved in:
Bibliographic Details
Main Author: Eric, Karerangabo
Format: Thesis
Language:eng
eng
Published: 2009
Subjects:
Online Access:https://etd.uum.edu.my/1924/1/Karerangabo_Eric.pdf
https://etd.uum.edu.my/1924/2/1.Karerangabo_Eric.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.1924
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic QA76 Computer software
spellingShingle QA76 Computer software
Eric, Karerangabo
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
description Today, computer networks attacks have continued to increase in severity and sophistication. Data lost and unavailability of network resources due to attacks from internet have negative financial impact on many companies. Unprotected organisation’s networks from internet attacks face high risk of data loss and espionage. Network devices that make up network are the most targeted in order to penetrate in companies system as some come with vulnerability from the manufacturer. In this study, network security architecture for server room had been developed for enhancing the security. Further, two simulation models had been developed to compare the throughput for both existing and developed security architecture.
format Thesis
qualification_name masters
qualification_level Master's degree
author Eric, Karerangabo
author_facet Eric, Karerangabo
author_sort Eric, Karerangabo
title Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
title_short Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
title_full Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
title_fullStr Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
title_full_unstemmed Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
title_sort simulation on network security design architecture for server room in rwanda information technology agency
granting_institution Universiti Utara Malaysia
granting_department College of Arts and Sciences (CAS)
publishDate 2009
url https://etd.uum.edu.my/1924/1/Karerangabo_Eric.pdf
https://etd.uum.edu.my/1924/2/1.Karerangabo_Eric.pdf
_version_ 1747827233819459584
spelling my-uum-etd.19242013-07-24T12:13:45Z Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency 2009 Eric, Karerangabo College of Arts and Sciences (CAS) College of Arts and Sciences QA76 Computer software Today, computer networks attacks have continued to increase in severity and sophistication. Data lost and unavailability of network resources due to attacks from internet have negative financial impact on many companies. Unprotected organisation’s networks from internet attacks face high risk of data loss and espionage. Network devices that make up network are the most targeted in order to penetrate in companies system as some come with vulnerability from the manufacturer. In this study, network security architecture for server room had been developed for enhancing the security. Further, two simulation models had been developed to compare the throughput for both existing and developed security architecture. 2009 Thesis https://etd.uum.edu.my/1924/ https://etd.uum.edu.my/1924/1/Karerangabo_Eric.pdf application/pdf eng validuser https://etd.uum.edu.my/1924/2/1.Karerangabo_Eric.pdf application/pdf eng public masters masters Universiti Utara Malaysia Amer H. and Hamilton A., 2008. Understanding Security Architecture. Proceeding of SpringSim conference. Auburn University Auburn, Alabama 36849-5347, USA.Ashley M. ,2006. Layered Network Security: a best practice approach. White paper.StillSecure.Backfield J. 2008. Network Security Model. SANS Institute Reading room, retrieved from: www.sans.org/info/36909 Bai Y., Summers W., & Bosworth E., 2007. Teaching Network Risk Assessment to Online Graduate Students. Information Security Curriculum Development Conference ’07,September 28-29, 2007, Kennesaw, Georgia, USA.Bhatt D. V.,Schulze S., & Hancke G. P., 2006. Secure Internet Access to Gateway Using Secure Socket Layer. IEEE transactions on instrumentation and measurement, vol. 55, no. 3, june 2006 Bouchard M., 2009. The Next Step in Network Security for Enterprises. White paper.Broda M. Nortel’s Network Security Architecture: New dimensions in network security.Brown S. G. & Yip F., 2006. Integrating Pattern Concepts & Network Security Architecture. IEEE journal Bye, R., Schmidt S., Luter K., & Albayrak, 2008. Application-level simulation for network security. Proceeding of Simulation tools March 03 - 07, 2008, Marseille, France.Chen J., Wang X. & He L., 2008. An Architecture for Differentiated Security Service. Proceeding of International Symposium on Electronic Commerce and Security, DOI 58 10.1109/ISECS.2008.65 Convery S., 2004. Network Security Architectures. Expert guidance on designing secure networks. Cisco Press. Deal R. A., 2005. Cisco Router Firewall Security. Harden perimeter routers with Cisco Firewallfunctionality and features to ensure network security. Cisco Press. 800 East 96th Street. Indianapolis, IN 46240 USA.Deccio T. C, 2004. Network-Layer Selective Security. Master thesis.F5 Networks, Inc, 2006. Unified Access and Application Delivery Methodology. White Paper.Idika N. C., Marshall B. H. & Bhargava B. K., 2009. Maximizing Network Security Given a Limited Budget. In proceeding at Tapia’09, April 1-4, 2009, Portland, Oregon,USA.Hilley S., 2002. Network security architecture without perimeters. Journal Incorporating E- Commerce, Internet and Telecommunications Security Kartalopoulos S. V., 2008. Differentiating Data Security and Network Security. IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings.Kettani M. & Debbagh T., 2008. NCSec – A National Cyber Security Referential for the Development of Code of Practice in National Cyber Security Management. In proceeding of ICEGOV2008, December 1-4, 2008, Cairo, Egypt. Kuhl M. E., Sudit M., Kistner K., & Costantini K., 2007. Cyber attack modeling and simulation for network security analysis. Proceedings of the 2007 Winter Simulation 59 Conference Martinez D., 2008. Protecting Critical Infrastructure: Implementing Integration and Expanding Education. SIGCAS Computers and Society, Volume 38, No. 1, March 2008.Law & McComas (2001). How to build valid and credible simulation models. Procedings of the 2001 Winter simulation Conference.Liska A., 2003. The Practice of Network Security. Deployment Strategies for Production Environments. Prentice Hall PTR.Lammle et al, 2005. CCSP. Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541. Cisco press.Lincke S. J. & Holland A., 2007. Network Security: Focus on Security, Skills, and Stability. 37th ASEE/IEEE Frontiers in Education Conference October 10 – 13, 2007,Milwaukee, WI Liljenstam M., Liu J., Nicol D., Yuan Y., Yan G., and Grier C., 2005. Rinse: The real- Time immersive network simulation environment for network security exercises.Proceedings of the Workshop on Principles of Advanced and Distributed Simulation(PADS’05). Mallery J. & Kelly P., 2005. Hardening network security. Scisco press.Mohamad R.,2004. Network Security Architecture. Proceedings of South Central Conference, JCSC 19, 4.Neumann PG, 2000. Practical Architecture for Survivable System and Networks. SRI International, retrieved from : http://www.csl.sri.com/users/neumann/survivability.pdf Peng C., Zhang Q., & Tang C., 2009. Improved TLS Handshake Protocols Using 60 Identitybased Cryptography. 2009 International Symposium on Information Engineering and Electronic Commerce. 2009 IEEE Porras P. & Shmatikov V., 2006. LargeScale Collection and Sanitization of Network Security Data: Risks and Challenges. Proceeding at NSPW 2006, Schloss Dagstuhl, Germany.Rahman S., Nguyen T. A., & Yang T. A., 2006. Developing certificate-based projects for web Security classes. Mid-south conference.Riley F., 2003. The Georgia Tech Network Simulator. In Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research.Rufi A., 2007. Network security. 1 and 2 companion guide. . Cisco Press.Stawowski M., 2007. The Principles of Network Security Design. Nortel Technical Journal,Issue 3, ISSA Journal.Schmidt M., Smith M., Fallenbeck N., Picht H. & Freisleben B., 2007. Building a Demilitarized Zone with Data Encryption for Grid Environments. GridNets 2007,October 17–19, 2007, Lyon, France.Schudel G., 2007. Router Security Strategies: Securing IP Network Traffic Planes. Cisco Press.Shieh, A., Myers, A. C., and Sirer, E. G. 2008. A stateless approach to connection-oriented protocols. ACM Transactions on Computer Systems, Vol. 26, No. 3, Article 8,Publication date: September 2008.61 Tidwell T., Larson R., Fitch K., and Hale J., 2001. Modeling Internet Attacks. Proceedings of the 2001 IEEE. Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 5-6 June, 2001 Yang T. A. & Nguyen T. A., 2006. Network Security Development Process.A Framework for Teaching Network Security Courses.Watkin A & Wallace K., 2008. CCNA Security. Official Exam Certification Guide. Cisco Press. Kaeo M., 2004. Designing Network Security. A practical guide to create a secure network infrastructure. Second Edition. Cisco Press.Wei S., Mirkovic J. & Swany M., 2005. Distributed worm simulation with a realistic Internet model. PADS.