CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Feasibility of Network Security Measures in IRAN

عنوان مقاله: Feasibility of Network Security Measures in IRAN
شناسه ملی مقاله: RSTCONF01_446
منتشر شده در کنفرانس بین المللی پژوهش در مهندسی، علوم و تکنولوژی در سال 1394
مشخصات نویسندگان مقاله:

Sajjad Daliri - Networking Department, Keshavarz Hi-Tec Solution Company, Agricultural Bank of IRAN

خلاصه مقاله:
Security systems are designed as a result of a complex process which germinates from what is called is a felt need : need for security which is determined by an amalgam and interface of people, processes, and price, each of which affected by the advancement in technology. Today, a Secure Network is a vital necessity in any industry, institution and business. The velocity and volume of information exchange are mind-boggling. These two characteristics may affect the quality, integrity and reliability of information the results of which could be the escalating fear and uncertainty of users of such information. Business, industry, the defense apparatus, universities and other institutions of learning are concerned with the degree of confidence their clients assign to the information they produce and disseminate, which has persuaded them to invest in the state of the art security systems. As the world of Internet knows no boundaries, advantages and disadvantages as well as problems and solutions in such world are universal. In other words, no institution can assume that it is not a part of this complicated world, and do not equip itself with the best products in securing its information. This study examines the feasibility of network security in large organizations in Iran, in general, and the feasibility of network security in the Agricultural Bank of Iran, in particular. It describes the important measures and the essential steps that have to be taken to properly use a network security system in the Bank. Along these lines, and considering the Iranian environment, the paper presents different scenarios with their advantages and disadvantages

کلمات کلیدی:
Cryptography, Network Security, Attacks, Application Layer, Wireless Network

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/398514/