天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

An Open System Framework for Reducing Users’ Vulnerabilities

發(fā)布時間:2021-05-08 13:30
  Network and information security is a critical discipline in both academia and business and is also lucrative for organizations and enterprise IT.Many advanced technologies and latest network security appliances are present in cyberspace today and are often robustly applied in networking ecosystems to provide safeguards against attacks and data breaches.However,network infiltrations by malware and information breaches incidents still occur today despite the applications of these security technol... 

【文章來源】:武漢紡織大學(xué)湖北省

【文章頁數(shù)】:65 頁

【學(xué)位級別】:碩士

【文章目錄】:
ABSTRACT
ACKNOWLEDGEMENT
ABBREVIATIONS
1. CHAPTER ONE: INTRODUCTION
    1.0. Introduction to the Research Study
    1.1. Background of the Study
    1.2. Network Security and Information Security
    1.3. Example Methods used to Ensure Network Security
        i. Firewalls
        ii. Email Security
        iii. Antivirus and Antimalware Solutions
        iv. Network Segmentation
        v. Access Control
        vi. Web Application Security
        vii. Virtual Private Networks
        viii. Security Information and Event Management
        1.3.1. Some examples of customized rules to alert on event conditions involve userauthentication rules, attacks detected and infections detected
        1.3.2 Summary Examples of Attacks/Threats and Vulnerabilities to Network Security
        1.3.3. The top vulnerabilities in March 2018 include: (According to the security vendorCenzic)
    1.4. Statement of the Problem
    1.5. Industry examples of network security breaches compromising information security
        1.5.1. Case One: TJX
        1.5.2. Case Two: Target
        1.5.3 Case Three: Yahoo
        1.5.4. Possible Information Security Breach Scenario
    1.6. Summary of the Introduction to the Research Study
2. CHAPTER TWO: LITERATURE REVIEW
    2.0. Introduction to Literature Review
    2.1. Why Literature Review?
    2.2. The User as a Vulnerability in a Network Security Environment
    2.3. Users – The Weak Link in a Network Security Environment
    2.4. Antithesis of users as Weakest Link in a Network Security System
    2.5. Open Access System Architectures (OSA)
    2.6. The Open Group Architecture Framework (TOGAF)
    2.7. Case Studies of TOGAF Developed Systems
        2.7.1. Case One: Department of Social Security (DSS – UK)
        2.7.2. Case Two: Ministry of Defense UK
        2.7.3. Case Three: The Joint Engineering Data Management Information and ControlSystem (JEDMICS)-UK
    2.8. Summary of the Literature Review
3. CHAPTER THREE: RESEARCH METHODOLOGY
    3.0. Introduction to Research Methodology
    3.1. Methodology and the Research Process: Systematic Literature Review
    3.2. Research Process
        3.2.1. Inclusion and Exclusion Criteria
        3.2.2. Research Material Gathering and Critical Assessment of the Research
    3.3. Summary of the Research Methodology
4. CHAPTER FOUR: RESULTS AND DISCUSSION
    4.0. Introduction to Results and Discussion
    4.1. Discussion
    4.2. Open Access Architectural Framework for Enhancing Network and Information Securityin Cyberspace
    4.3. Evaluating Architectural Elements
    4.4. Suggested Elements and Components of an Open Ecosystem Architecture
        4.4.1. Open Access Development Architecture and Application Programming Interfaces
        4.4.2. Connectors
        4.4.3. Development Operations (Dev Ops) Automation Tools and Scripts
    4.5. Security Use Cases Enabled by Integrated and Automated Solutions
        4.5.1. Improvement Methodologies and Transformation of Endpoint Security
        4.5.2. Ensuring the Security of Operational Technology
        4.5.3. Unification of Cyber Security Systems
        4.5.4. Cloud Security
        4.5.5. Coordinated Security Policy Management
    4.6. The Open System Architectural Framework for Reducing Users’ Weaknesses In TheNetwork Security Ecosystem
    4.7. Importance and Contribution to the Study
    4.8. Reliability and Validity
    4.9. Summary of the Results and Discussions
5. CHAPTER FIVE: CONCLUSION
    5.0. Introduction to the Conclusion of the Research Study
    5.1. Conclusion
    5.2. Future Research
REFERENCES



本文編號:3175421

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/3175421.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶b0bd8***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
亚洲一区二区三区有码| 观看日韩精品在线视频| 国产精品熟女乱色一区二区| 国产极品粉嫩尤物一区二区| 亚洲欧美日韩国产自拍| 中文字幕人妻日本一区二区| 性感少妇无套内射在线视频| 久久热这里只有精品视频| 国产日韩欧美专区一区| 又黄又爽禁片视频在线观看| 日韩中文字幕在线不卡一区| 日韩性生活片免费观看| 五月的丁香婷婷综合网| 正在播放玩弄漂亮少妇高潮| 精品女同一区二区三区| 国产亚洲欧美一区二区| 日本少妇三级三级三级| 欧美日韩国产成人高潮| 国产精品成人一区二区在线| 色婷婷丁香激情五月天| 欧美一区二区三区五月婷婷| 国产麻豆视频一二三区| 国产又长又粗又爽免费视频| 国产av一区二区三区麻豆| 大伊香蕉一区二区三区| 日韩人妻精品免费一区二区三区| 色综合伊人天天综合网中文| 欧美国产日本免费不卡| 午夜福利视频日本一区| 国产内射一级二级三级| 日本女优一色一伦一区二区三区 | 日韩一区二区三区在线日| 福利新区一区二区人口| 五月婷婷亚洲综合一区| 99精品国产一区二区青青| 亚洲婷婷开心色四房播播| 在线观看视频日韩成人| 一区中文字幕人妻少妇| 欧美激情视频一区二区三区| 91免费一区二区三区| 国产精品视频一级香蕉|