scholarly journals Security Analysis of Grr Rapid Response Network using COBIT 5 Framework

Author(s):  
Imam Riadi ◽  
Sunardi Sunardi ◽  
Eko Handoyo

Connection from the Internet is required to always be maintained under any conditions, but not always connectivity will run smoothly, lots of crowds or problems that require connections do not run smoothly. Application of security systems to overcome all problems and difficulties, both technical and non-technical which can affect system performance. GRR Rapid Response is the answer to internet network security. GRR asks for a client-server model, agents installed on the machine (client) to be able to communicate with the Grr server to access and provide unique client IDs. After setting this active and running, the server can send a request to the client who collects information, and the client sends a response to the request. After Grr is made, it is necessary to do a system evaluation and evaluation. The COBIT 5 framework is a good standard for determining the level of maturity of network security. The maturity level obtained is 2.899 can be decided at an institutional maturity level defined. The level of support the institution has agreed to, supports and supports all activities related to network security.

2010 ◽  
Vol 69 (7) ◽  
pp. 629-638
Author(s):  
J. Sisniega-Gonzalez ◽  
E. Aguirre-Anaya ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


2008 ◽  
pp. 1579-1594
Author(s):  
Eitel J.M. Lauría

This paper explores the impact of human factor and organizational behavior on the outcome of information technology implementation projects. Client/server technology implementation is used as the leading case, given the fact that it is a good example of a major paradigm shift. The results draw attention to the importance of end-user interaction and the maturity level of organizations as significant factors in the success and benefits of the project. Client/server projects seem to be more successful, are executed in a more timely manner, and yield greater benefits when end users take an active participation in some of the stages, particularly during the implementation phase.


Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Peik Astrom

Network security is defined as “a set of procedures, practices and technologies for protecting network servers, network users and their surrounding organizations” (Oppliger, 2000, Preface). The need for network security is caused by the introduction of distributed systems, networks, and facilities for data communication. Improved network security is required because of the rapid development of communication networks. Network security is achieved by using software based tools, that is, network security software (Pulkkis, Grahn & Åström, 2003).


Sign in / Sign up

Export Citation Format

Share Document