SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
DOI : 10.5121/ijnsa.2013.5509 107
DEFENSE MECHANISMS FOR
COMPUTER-BASED INFORMATION
SYSTEMS
Majid Alshammari1
and Christian Bach2
1
Department of Computer Science and Engineering, School of Engineering, University
of Bridgeport
2
Department of Technology Management and Biomedical Engineering, School of
Engineering, University of Bridgeport
ABSTRACT
Nowadays, corporations and a government agencies relay on computer-based information system to
manage their information, this information may be classified, so it will be dangerous if it is disclosed by
unauthorized persons. Therefore, there is urgent need for defense. In this research, defense has been
categorized into four mechanisms technical defense, operation defense, management defense, and physical
defense based on the logic of computer and network security. Also, each mechanism has been investigated
and explained in the term of computer based information systems.
KEYWARDS
ComputerBased Information System,
INTRODUCTION
Computer-based information systems CBIS have been around for a long time in organization.
These systems help organizations to get a reliable and a centralized access to their stored
information. Accordingly, most of organizations relay on computer based information systems,
but this kind of reliance may be catastrophic if a disruption occurs [1]. An example, a survey of
U.S. insurance companies found that 90 percent of these firms, which are dependent upon
computer based information systems, would fail after a significant loss or disruption of the CBIS
facility [2], this survey shows the importance of computer based information systems security
because any security weakness in computer based information systems may led to major service
interruption, and may unwanted exposure of sensitive information of the organizations [3]. Thus,
it is importance to investigate the defense mechanisms for computer-based information systems to
increase its efficiency and security.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
Computer-based information systems have three major components. The first component is
computers. The second component is network. And the third component is human. Therefore,
Implementation defense mechanisms for computer
the three components.
RESEARCH METHOD
An extensive literature search in computers security, networks security, and computer
information systems helps to build a general model for defense mechanisms of computer
information system. The first mechanism is technical defense. The second mechanism is
operational defense. The third mechanism is managerial defense. The forth mechanism is phy
defense. The figure below presents the four mechanisms and the related hypothesis to reach the
desired goal.
Figure 1: Defense mechanism model of computer
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
ion systems have three major components. The first component is
computers. The second component is network. And the third component is human. Therefore,
Implementation defense mechanisms for computer-based information systems should cover all
An extensive literature search in computers security, networks security, and computer
helps to build a general model for defense mechanisms of computer
information system. The first mechanism is technical defense. The second mechanism is
operational defense. The third mechanism is managerial defense. The forth mechanism is phy
defense. The figure below presents the four mechanisms and the related hypothesis to reach the
Figure 1: Defense mechanism model of computer-based information system
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
108
ion systems have three major components. The first component is
computers. The second component is network. And the third component is human. Therefore,
based information systems should cover all
An extensive literature search in computers security, networks security, and computer-based
helps to build a general model for defense mechanisms of computer-based
information system. The first mechanism is technical defense. The second mechanism is
operational defense. The third mechanism is managerial defense. The forth mechanism is physical
defense. The figure below presents the four mechanisms and the related hypothesis to reach the
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
109
M1: TECHNICAL DEFENSE
Technical defense involves defenses that are used in computers and networks technically.
Technical defense can be encryption, firewall, antimalware, and intrusion detection.
Encryption provides confidentiality for information exchange. The basic idea of encryption is
transferring the plain text into cipher text to hide the information from unauthorized person.
Therefore, Encryption is considered as technical defenses that make the information exchange
invisible for an attacker. If the organization has firewalls, anti viruses, anti spyware, and strong
security policies information exchange is not secured simply the information is exchanged in plan
text. [4] Therefore, encryption provides confidentiality. There are two types of Encryption. The
first type is symmetric encryption, known as conventional encryption, or single-key encryption
involves using one key between the communicating parties. When two entities or parties want to
communicate they should first agree on using one key then using this key for encryption and
decryption. Symmetric encryption relays on the secrecy of the key, so keeping is important
because if an opponent gained this key he/she will compromise the system. The second type of
encryption is asymmetric encryption, involves using two different keys one is a public key and
the other one is a private key. When two entities or parties want to communicate they should first
exchange their public key and keep their private keys secure. For example, when an entity A want
to communicate securely with another entity B, it encrypt a message with B’s public key then
send it B, B decrypt the message with its private key. There are many software and hardware in
the market that support both of symmetric encryption and asymmetric encryption. Organizations
should use encryption to provide data confidentiality.
Firewalls are necessary of securing the computer information system. Today the Internet service
is necessary to the organizations; it allows employees of an organization network to contact to the
outside word, so there is need for first line defense. Firewalls consider as first line defense for
computer information systems [5]. The basic idea of firewalls is protecting information system
against outside and inside attacks, so the working by filtering incoming packet and outgoing
packet. Generally, most firewalls have two default policies. The first one is discard; means if an
arriving packet dose not matches any rule in IPtable discard it. The second one is allow; means an
arriving packet dose not match any rule in IPtable allow it to pass. Moreover, there are two types
of firewalls, packet-based firewall and Stateful-based firewall. Packet – based firewall also called
Packet filtering, it works by inspecting or checking the IP filed of each packet then it take a
decision whether it allow the packet to pass or deny it based on the IP address of the source, the
IP address of the destination, the source port number whether it TCP or UDP and the destination
port [6] This type of firewalls relays on IPtable, the IPtable is set of rules that have been set by
network administrator. For example, the network administrator may set a rule deny any packet
comes form 192.168.1.10 with port number 80. When this packet arrives to the firewall, it will
check the IPtable to take the decision. Packet firewall is easy to install, and complex to mange
because you need to set many rules. Statefull firewall provides more advance future by keeping
track of a given connection; it works in transport layer and the application layers. Statefullfirewall
inspects a packet like the packet firewall, but it tracks the TCP connection. When a packet arrive
it checks the packet filed, if the packet matched the passing policy, it add it as an entity to the
IPtable and keep track for the TCP sequence to protect the session from attacks. There are
numerous of software and hardware firewalls in market today, and as the treats growing up the
security companies will never stop developing security tools. Firewalls one of the most impotent
tools. It is worth to mention that firewall can be a feature that is added to operation system, router,
and access points. For example, most operating systems OS have built-in firewall, but users may
activate it.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
110
Anti-malware provides protection for operation systems against malicious software. Anti malware
can be anti-virus, or anti-spyware. Malware can be found in files, executable programs, and the
operation system [7]. Therefore, computer information systems should have anti malware.
Intrusion detection provides real time warnings for computer information system by monitoring
and analysis the any attempts to access the system. Intrusion detection will fire an alarm when
attackers try to exploit vulnerabilities of software for opening a backdoor into it [8]. Generally,
Intrusion Detection can be classified into Host-based intrusion detection and Network-based
intrusion detection. Host-based Intrusion Detection adds an extra layer of security for a host. It
uses the operating system OS information to determine attacks [9] such as user logs, and software
activity. Network-based intrusion detection (NID) is monitoring the network traffic at some place
on a network. It checks each packet to detect illegitimate traffic. NID can monitors network and
transport layers activity. Usually NID have sensors and one or more servers for in one network,
the sensors are used to monitor traffic on different location in the network, and the servers are
used to manage the sensors [10]. Generally, there are two techniques for intrusion detection,
anomaly detection and signature detection. Anomaly detection is gathering information related to
the behavior of users then analysis it to determine whether the behavior is legitimate or not [11]
The second approach is signature detection, it attempts to set rules or attack patterns to determine
whether it is legitimate or not. Therefore, computer information systems should have one or more
Intrusion detection.
M2: OPERATIONAL DEFENSE
Operational defense has a significant role in the management of computer information systems
security [12]. Therefore, even if organizations have applied technical security to their computer
information system such as encryption, firewalls, and intrusion detection, they need to set up
security policies for the system. Usually, operation defenses include two approaches. The first
approach is setting up security policies for computer information system. The security policy has
important role in term of information security management for computer information system
implementation. [13] Security policy is made up of documents that do not provide technical and
implementation details. It only provides management rules for computer information system. The
second approach is personnel training for the employee.
M3: MANAGERIAL DEFENSE
Involves putting standards for hiring people. For example, an extensive background check and an
extensive security background check [14] The importance of background check come from the
following example, if an organization hire inadequate person to mange the computer information
system, he or she may misuse with configuration and implementation that may lead to open holes
or backdoors in CBIS as a result this person become a threat to the system. Also, security
background check is very impotent because if an organization hires a criminal person, he or she
may sell the organization information to another organization.
M4: PHYSICAL DEFENSE
Involves defenses for physical assets. Physical defense is important for two reasons. First reason,
physical equipment is very expansive. The second reason, any damage for the equipment may
cause data loss. Also, physical defense provides protection to the computer information systems
against Natural disasters, technical faults, andhuman. Natural disaster one of the most dangerous
threats to computer information system, for example hurricane may cause damage to the physical
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
111
equipment by strong wind and flying objects. Another example, earthquake also cause damages to
physical equipment. Therefore, an organization may uses off site equipment. Technical faults
such as electrical overvoltage, electrical under-voltage, and electrical interruption are considered
as threats to computer information system. Electrical under-voltage takes place when computer
information systems receive less voltage than they need to work normally. Electrical overvoltage
occurs when computer information systems receive high voltage than they need to work. Therefor
an organization may use stand by generators. Human cause unusual and unpredictable threats to
computer information systems. Human threat can be classified into three categories; unauthorized
physical access, theft, and misuse. The first category is unauthorized physical access, it occurs
when an unauthorized person access to restricted areas for copying data, or misuse. The second
category is thefts, which means theft of equipment and official papers. Therefore, the organization
should have restricted rules for accessing the desired places.
RELATIONSHIP BETWEENDEFENSE MECHANISM MODEL AND CBIS
COMPONENTS
Computer-based information systems have three major components, computers, network, and
human. Thus, based on the model each component must be secured by at least one of the defense
mechanisms. The table below presents the relationship.
CBIS
components
Defense Mechanisms
Technical
defense
Operational
defense
Managerial
defense
Physical
defense
Computers
Networks
Human
Table 2: The relationship between defense mechanism and CBIS components
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
112
CONCLUSION
Security of computer-based information system should be a top priority for organizations because
a disruption of the CBIS will lead to unwanted results. Thus, organizations should implement the
defense mechanisms to protect their information. The first mechanism (Technical defense)
provides defense to the system by using software and hardware, for example, encryption, firewall,
anti-malware, and intrusion detection. The second mechanism (Operational defense) provides
defense to the system by setting up system policies. The third mechanism (Managerial defense)
provides defense to the system by putting standard for hiring. The forth mechanism (Physical
defense) provides defense to physical assets.
REFERENCES
[1] K. D. Loch, H. C. Houston, and M. E. Warkentin, "Threats to Information Systems: Today's Reality,
Yesterday's Understanding," MIS Quarterly, vol. 16, pp. 173-186, 1992.
[2] R. Carter, "Dependence and Disaster- Recovering from EDP Systems Failur," Management Services
(UK) (32:12), pp. pp.20-22, 1988.
[3] W. Ping An, "Information security knowledge and behavior: An adapted model of technology
acceptance," in Education Technology and Computer (ICETC), 2010 2nd International Conference
on, 2010, pp. V2-364-V2-367.
[4] H. Li and P. ZhaoJian, "Security Research on P2P Network," in Computational Intelligence and
Software Engineering, 2009. CiSE 2009. International Conference on, 2009, pp. 1-5.
[5] M. G. Gouda and A. X. Liu, "A model of stateful firewalls and its properties," in Dependable Systems
and Networks, 2005. DSN 2005. Proceedings. International Conference on, 2005, pp. 128-137.
[6] Y. Xin, C. Wei, and W. Yantao, "The research of firewall technology in computer network security,"
in Computational Intelligence and Industrial Applications, 2009. PACIIA 2009. Asia-Pacific
Conference on, 2009, pp. 421-424.
[7] A. Marx, "A guideline to anti-malware-software testing," European Institute for Computer Anti-Virus
Research (EICAR), pp. 218-253, 2000.
[8] L. Zhuowei, A. Das, and Z. Jianying, "Theoretical basis for intrusion detection," in Information
Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 184-
192.
[9] Y. Lin, Y. Zhang, and Y.-j. Ou, "The Design and Implementation of Host-Based Intrusion Detection
System," in Intelligent Information Technology and Security Informatics (IITSI), 2010 Third
International Symposium on, 2010, pp. 595-598.
[10] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," Network, IEEE, vol.
8, pp. 26-41, 1994.
[11] V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys
(CSUR), vol. 41, p. 15, 2009.
[12] S. Haddad, S. Dubus, A. Hecker, T. Kanstren, B. Marquet, and R. Savola, "Operational security
assurance evaluation in open infrastructures," in Risk and Security of Internet and Systems (CRiSIS),
2011 6th International Conference on, 2011, pp. 1-6.
[13] Z. Cosic and M. Boban, "Information security management — Defining approaches to
Information Security policies in ISMS," in Intelligent Systems and Informatics (SISY), 2010 8th
International Symposium on, 2010, pp. 83-85.
[14] L. J. Bottino, "Security Measures in a Secure Computer Communications Architecture," in 25th
Digital Avionics Systems Conference, 2006 IEEE/AIAA, 2006, pp. 1-18.
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013
113
AUTHORS
Majid Alshammari
Majid Alshammari received his MS in computer science and Graduate Certificate in
Information Protection and Security from University of New Have at West Haven,
Connecticut, USA. He is pursuing his Doctorate in Computer Science and Engineering at
the University of Bridgeport at Bridgeport, Connecticut, USA. He is MCSEs and CEH. His
research interests include network, computer and information security. He is a member of
the Association for Computer society and information society, IEEE.
Christian Bach
Christian Bach is an Assistant Professor of Technology Management and Biomedical
Engineering at University of Bridgeport. He received his MBA and PhD in Information
Science from University at Albany SUNY in Albany, New York. Some of Dr. Bach's
research interests include Intracellular Immunization, induced Pluripotent Stem (iPS) cells,
Artificial Transcription Factors, Target Detection Assay, Microarr ays, Bioreactors, Protein Folding (micro
-level), Target Binding Site Computation, micro Database Systems, and Knowledge Cubes. He is the author
of multiple journal articles including "Tower Computing: Utilization of Cloud Computing in science-based
Knet environments," "Employing the Intellectual Bandwidth Model for Measuring Value Creation in
Collaborative Environments," and "Scientific and Philosophical Aspects of Information and the
Relationships among Data, Information, and Knowledge."

More Related Content

What's hot

Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1UDCNTT
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction rajakhurram
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingITIIIndustries
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityComputing Cage
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
60304756 whitman-ch01-1
60304756 whitman-ch01-160304756 whitman-ch01-1
60304756 whitman-ch01-1
 
Network security
Network securityNetwork security
Network security
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Ch01
Ch01Ch01
Ch01
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone Modeling
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
I0516064
I0516064I0516064
I0516064
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 

Similar to DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS

IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxjeffreye3
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 

Similar to DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS (20)

50120140501013
5012014050101350120140501013
50120140501013
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
A01450131
A01450131A01450131
A01450131
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
Forensics
ForensicsForensics
Forensics
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 DOI : 10.5121/ijnsa.2013.5509 107 DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS Majid Alshammari1 and Christian Bach2 1 Department of Computer Science and Engineering, School of Engineering, University of Bridgeport 2 Department of Technology Management and Biomedical Engineering, School of Engineering, University of Bridgeport ABSTRACT Nowadays, corporations and a government agencies relay on computer-based information system to manage their information, this information may be classified, so it will be dangerous if it is disclosed by unauthorized persons. Therefore, there is urgent need for defense. In this research, defense has been categorized into four mechanisms technical defense, operation defense, management defense, and physical defense based on the logic of computer and network security. Also, each mechanism has been investigated and explained in the term of computer based information systems. KEYWARDS ComputerBased Information System, INTRODUCTION Computer-based information systems CBIS have been around for a long time in organization. These systems help organizations to get a reliable and a centralized access to their stored information. Accordingly, most of organizations relay on computer based information systems, but this kind of reliance may be catastrophic if a disruption occurs [1]. An example, a survey of U.S. insurance companies found that 90 percent of these firms, which are dependent upon computer based information systems, would fail after a significant loss or disruption of the CBIS facility [2], this survey shows the importance of computer based information systems security because any security weakness in computer based information systems may led to major service interruption, and may unwanted exposure of sensitive information of the organizations [3]. Thus, it is importance to investigate the defense mechanisms for computer-based information systems to increase its efficiency and security.
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 Computer-based information systems have three major components. The first component is computers. The second component is network. And the third component is human. Therefore, Implementation defense mechanisms for computer the three components. RESEARCH METHOD An extensive literature search in computers security, networks security, and computer information systems helps to build a general model for defense mechanisms of computer information system. The first mechanism is technical defense. The second mechanism is operational defense. The third mechanism is managerial defense. The forth mechanism is phy defense. The figure below presents the four mechanisms and the related hypothesis to reach the desired goal. Figure 1: Defense mechanism model of computer International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 ion systems have three major components. The first component is computers. The second component is network. And the third component is human. Therefore, Implementation defense mechanisms for computer-based information systems should cover all An extensive literature search in computers security, networks security, and computer helps to build a general model for defense mechanisms of computer information system. The first mechanism is technical defense. The second mechanism is operational defense. The third mechanism is managerial defense. The forth mechanism is phy defense. The figure below presents the four mechanisms and the related hypothesis to reach the Figure 1: Defense mechanism model of computer-based information system International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 108 ion systems have three major components. The first component is computers. The second component is network. And the third component is human. Therefore, based information systems should cover all An extensive literature search in computers security, networks security, and computer-based helps to build a general model for defense mechanisms of computer-based information system. The first mechanism is technical defense. The second mechanism is operational defense. The third mechanism is managerial defense. The forth mechanism is physical defense. The figure below presents the four mechanisms and the related hypothesis to reach the
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 109 M1: TECHNICAL DEFENSE Technical defense involves defenses that are used in computers and networks technically. Technical defense can be encryption, firewall, antimalware, and intrusion detection. Encryption provides confidentiality for information exchange. The basic idea of encryption is transferring the plain text into cipher text to hide the information from unauthorized person. Therefore, Encryption is considered as technical defenses that make the information exchange invisible for an attacker. If the organization has firewalls, anti viruses, anti spyware, and strong security policies information exchange is not secured simply the information is exchanged in plan text. [4] Therefore, encryption provides confidentiality. There are two types of Encryption. The first type is symmetric encryption, known as conventional encryption, or single-key encryption involves using one key between the communicating parties. When two entities or parties want to communicate they should first agree on using one key then using this key for encryption and decryption. Symmetric encryption relays on the secrecy of the key, so keeping is important because if an opponent gained this key he/she will compromise the system. The second type of encryption is asymmetric encryption, involves using two different keys one is a public key and the other one is a private key. When two entities or parties want to communicate they should first exchange their public key and keep their private keys secure. For example, when an entity A want to communicate securely with another entity B, it encrypt a message with B’s public key then send it B, B decrypt the message with its private key. There are many software and hardware in the market that support both of symmetric encryption and asymmetric encryption. Organizations should use encryption to provide data confidentiality. Firewalls are necessary of securing the computer information system. Today the Internet service is necessary to the organizations; it allows employees of an organization network to contact to the outside word, so there is need for first line defense. Firewalls consider as first line defense for computer information systems [5]. The basic idea of firewalls is protecting information system against outside and inside attacks, so the working by filtering incoming packet and outgoing packet. Generally, most firewalls have two default policies. The first one is discard; means if an arriving packet dose not matches any rule in IPtable discard it. The second one is allow; means an arriving packet dose not match any rule in IPtable allow it to pass. Moreover, there are two types of firewalls, packet-based firewall and Stateful-based firewall. Packet – based firewall also called Packet filtering, it works by inspecting or checking the IP filed of each packet then it take a decision whether it allow the packet to pass or deny it based on the IP address of the source, the IP address of the destination, the source port number whether it TCP or UDP and the destination port [6] This type of firewalls relays on IPtable, the IPtable is set of rules that have been set by network administrator. For example, the network administrator may set a rule deny any packet comes form 192.168.1.10 with port number 80. When this packet arrives to the firewall, it will check the IPtable to take the decision. Packet firewall is easy to install, and complex to mange because you need to set many rules. Statefull firewall provides more advance future by keeping track of a given connection; it works in transport layer and the application layers. Statefullfirewall inspects a packet like the packet firewall, but it tracks the TCP connection. When a packet arrive it checks the packet filed, if the packet matched the passing policy, it add it as an entity to the IPtable and keep track for the TCP sequence to protect the session from attacks. There are numerous of software and hardware firewalls in market today, and as the treats growing up the security companies will never stop developing security tools. Firewalls one of the most impotent tools. It is worth to mention that firewall can be a feature that is added to operation system, router, and access points. For example, most operating systems OS have built-in firewall, but users may activate it.
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 110 Anti-malware provides protection for operation systems against malicious software. Anti malware can be anti-virus, or anti-spyware. Malware can be found in files, executable programs, and the operation system [7]. Therefore, computer information systems should have anti malware. Intrusion detection provides real time warnings for computer information system by monitoring and analysis the any attempts to access the system. Intrusion detection will fire an alarm when attackers try to exploit vulnerabilities of software for opening a backdoor into it [8]. Generally, Intrusion Detection can be classified into Host-based intrusion detection and Network-based intrusion detection. Host-based Intrusion Detection adds an extra layer of security for a host. It uses the operating system OS information to determine attacks [9] such as user logs, and software activity. Network-based intrusion detection (NID) is monitoring the network traffic at some place on a network. It checks each packet to detect illegitimate traffic. NID can monitors network and transport layers activity. Usually NID have sensors and one or more servers for in one network, the sensors are used to monitor traffic on different location in the network, and the servers are used to manage the sensors [10]. Generally, there are two techniques for intrusion detection, anomaly detection and signature detection. Anomaly detection is gathering information related to the behavior of users then analysis it to determine whether the behavior is legitimate or not [11] The second approach is signature detection, it attempts to set rules or attack patterns to determine whether it is legitimate or not. Therefore, computer information systems should have one or more Intrusion detection. M2: OPERATIONAL DEFENSE Operational defense has a significant role in the management of computer information systems security [12]. Therefore, even if organizations have applied technical security to their computer information system such as encryption, firewalls, and intrusion detection, they need to set up security policies for the system. Usually, operation defenses include two approaches. The first approach is setting up security policies for computer information system. The security policy has important role in term of information security management for computer information system implementation. [13] Security policy is made up of documents that do not provide technical and implementation details. It only provides management rules for computer information system. The second approach is personnel training for the employee. M3: MANAGERIAL DEFENSE Involves putting standards for hiring people. For example, an extensive background check and an extensive security background check [14] The importance of background check come from the following example, if an organization hire inadequate person to mange the computer information system, he or she may misuse with configuration and implementation that may lead to open holes or backdoors in CBIS as a result this person become a threat to the system. Also, security background check is very impotent because if an organization hires a criminal person, he or she may sell the organization information to another organization. M4: PHYSICAL DEFENSE Involves defenses for physical assets. Physical defense is important for two reasons. First reason, physical equipment is very expansive. The second reason, any damage for the equipment may cause data loss. Also, physical defense provides protection to the computer information systems against Natural disasters, technical faults, andhuman. Natural disaster one of the most dangerous threats to computer information system, for example hurricane may cause damage to the physical
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 111 equipment by strong wind and flying objects. Another example, earthquake also cause damages to physical equipment. Therefore, an organization may uses off site equipment. Technical faults such as electrical overvoltage, electrical under-voltage, and electrical interruption are considered as threats to computer information system. Electrical under-voltage takes place when computer information systems receive less voltage than they need to work normally. Electrical overvoltage occurs when computer information systems receive high voltage than they need to work. Therefor an organization may use stand by generators. Human cause unusual and unpredictable threats to computer information systems. Human threat can be classified into three categories; unauthorized physical access, theft, and misuse. The first category is unauthorized physical access, it occurs when an unauthorized person access to restricted areas for copying data, or misuse. The second category is thefts, which means theft of equipment and official papers. Therefore, the organization should have restricted rules for accessing the desired places. RELATIONSHIP BETWEENDEFENSE MECHANISM MODEL AND CBIS COMPONENTS Computer-based information systems have three major components, computers, network, and human. Thus, based on the model each component must be secured by at least one of the defense mechanisms. The table below presents the relationship. CBIS components Defense Mechanisms Technical defense Operational defense Managerial defense Physical defense Computers Networks Human Table 2: The relationship between defense mechanism and CBIS components
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 112 CONCLUSION Security of computer-based information system should be a top priority for organizations because a disruption of the CBIS will lead to unwanted results. Thus, organizations should implement the defense mechanisms to protect their information. The first mechanism (Technical defense) provides defense to the system by using software and hardware, for example, encryption, firewall, anti-malware, and intrusion detection. The second mechanism (Operational defense) provides defense to the system by setting up system policies. The third mechanism (Managerial defense) provides defense to the system by putting standard for hiring. The forth mechanism (Physical defense) provides defense to physical assets. REFERENCES [1] K. D. Loch, H. C. Houston, and M. E. Warkentin, "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, vol. 16, pp. 173-186, 1992. [2] R. Carter, "Dependence and Disaster- Recovering from EDP Systems Failur," Management Services (UK) (32:12), pp. pp.20-22, 1988. [3] W. Ping An, "Information security knowledge and behavior: An adapted model of technology acceptance," in Education Technology and Computer (ICETC), 2010 2nd International Conference on, 2010, pp. V2-364-V2-367. [4] H. Li and P. ZhaoJian, "Security Research on P2P Network," in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on, 2009, pp. 1-5. [5] M. G. Gouda and A. X. Liu, "A model of stateful firewalls and its properties," in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, 2005, pp. 128-137. [6] Y. Xin, C. Wei, and W. Yantao, "The research of firewall technology in computer network security," in Computational Intelligence and Industrial Applications, 2009. PACIIA 2009. Asia-Pacific Conference on, 2009, pp. 421-424. [7] A. Marx, "A guideline to anti-malware-software testing," European Institute for Computer Anti-Virus Research (EICAR), pp. 218-253, 2000. [8] L. Zhuowei, A. Das, and Z. Jianying, "Theoretical basis for intrusion detection," in Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, 2005, pp. 184- 192. [9] Y. Lin, Y. Zhang, and Y.-j. Ou, "The Design and Implementation of Host-Based Intrusion Detection System," in Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on, 2010, pp. 595-598. [10] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," Network, IEEE, vol. 8, pp. 26-41, 1994. [11] V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys (CSUR), vol. 41, p. 15, 2009. [12] S. Haddad, S. Dubus, A. Hecker, T. Kanstren, B. Marquet, and R. Savola, "Operational security assurance evaluation in open infrastructures," in Risk and Security of Internet and Systems (CRiSIS), 2011 6th International Conference on, 2011, pp. 1-6. [13] Z. Cosic and M. Boban, "Information security management — Defining approaches to Information Security policies in ISMS," in Intelligent Systems and Informatics (SISY), 2010 8th International Symposium on, 2010, pp. 83-85. [14] L. J. Bottino, "Security Measures in a Secure Computer Communications Architecture," in 25th Digital Avionics Systems Conference, 2006 IEEE/AIAA, 2006, pp. 1-18.
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 113 AUTHORS Majid Alshammari Majid Alshammari received his MS in computer science and Graduate Certificate in Information Protection and Security from University of New Have at West Haven, Connecticut, USA. He is pursuing his Doctorate in Computer Science and Engineering at the University of Bridgeport at Bridgeport, Connecticut, USA. He is MCSEs and CEH. His research interests include network, computer and information security. He is a member of the Association for Computer society and information society, IEEE. Christian Bach Christian Bach is an Assistant Professor of Technology Management and Biomedical Engineering at University of Bridgeport. He received his MBA and PhD in Information Science from University at Albany SUNY in Albany, New York. Some of Dr. Bach's research interests include Intracellular Immunization, induced Pluripotent Stem (iPS) cells, Artificial Transcription Factors, Target Detection Assay, Microarr ays, Bioreactors, Protein Folding (micro -level), Target Binding Site Computation, micro Database Systems, and Knowledge Cubes. He is the author of multiple journal articles including "Tower Computing: Utilization of Cloud Computing in science-based Knet environments," "Employing the Intellectual Bandwidth Model for Measuring Value Creation in Collaborative Environments," and "Scientific and Philosophical Aspects of Information and the Relationships among Data, Information, and Knowledge."