scholarly journals Modeling of Risk Factors in Determining Network Security Level

2014 ◽  
Vol 8 (3) ◽  
pp. 193-208 ◽  
Author(s):  
Martin Suhartana ◽  
Bens Pardamean ◽  
Benfano Soewito
2011 ◽  
Vol 474-476 ◽  
pp. 527-530
Author(s):  
Yu Jiao Wang ◽  
Hai Yun Lin

The basis to build effective network security protection is to reasonably evaluate on network security. Based on analysis on shortcomings of existing network security evaluation methods, the paper built network security evaluation index system according to CC specifications. The advantages of local variable weight comprehensive method were analyzed and the method of network security evaluation based on combination of AHP and local variable weight was presented. The evaluation example on some network elements indicates that the method evaluate on overall information security level, so that the evaluation result be objective and reasonable.


2014 ◽  
Vol 631-632 ◽  
pp. 971-975
Author(s):  
Xi Peng ◽  
Jian Qun Cui

This paper proposes an evaluation method based on fuzzy analytic hierarchy process (FAHP) for network security risk assessment. The paper analyzes the network security risk factors. By paired comparison of the importance of factors, the interval number fuzzy complementary judgment matrix is established to get the weight vectors of interval numbers of the factors. Then, by comparing the weight vectors of interval numbers, a possibility degree matrix is established, and then the weight coefficient of each factor are obtained. Finally the sorting result of the network security risk factors is presented. Instances show that the method is feasible and effective and it provides a reliable basis for security risk control strategy of network security staff.


KOMTEKINFO ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 29-29
Author(s):  
Syafri Arlis ◽  
Sahari

The development of information technology so rapidly, greatly helped the works of man. On the one hand man to be very helpful, but on the other side of the system's security level to rise sharply so that in essence the sides of human life is in a threatened position. The techniques of network security systems and precautions against attacks on information systems continue to be developed so that the integrity, availability and confidentiality in an information system becomes more secure. One way is by building a network security system and attack prevention system. In this paper, the authors construct a computer network security systems using a firewall Demiliteralized Zone (DMZ) by using IPtables which is the standard of Linux systems and and Switch Port Security (SPS). Utilization by combining these two technologies to achieve maximum levels of security and is able to block the intruder will attempt an attack with a variety of attacks identified.


Sign in / Sign up

Export Citation Format

Share Document