An Approach to a New Network Security Architecture of Nuclear and Research Facilities

1
A.B. Ramadan
A.B. Ramadan
2
M. Hefnawi
M. Hefnawi

Send Message

To: Author

GJCST Volume 19 Issue G3

Article Fingerprint

ReserarchID

2WJK8

An Approach to a New Network Security Architecture of Nuclear and Research Facilities Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

With the growth of information technology (IT) systems, network security is rapidly becoming a critical business concern. Due to the interconnectivity of IT systems, a comprehensive description of all of the key elements and relationships that make up an organization’s network security is needed, which can be referred as network security architecture. The value of this architecture is often questioned by organizations in terms of its practical application. This paper has presents a new approach to the network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be applied to a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Applying Zachman matrix provides the answers to what data assets the nuclear and research facilities controls, how they are used, and where they are located.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

A.B. Ramadan. 2019. \u201cAn Approach to a New Network Security Architecture of Nuclear and Research Facilities\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJCST-G Volume 19 (GJCST Volume 19 Issue G3): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-G Classification: C.2.0
Version of record

v1.2

Issue date

August 7, 2019

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 5106
Total Downloads: 1234
2026 Trends
Research Identity (RIN)
Related Research

Published Article

With the growth of information technology (IT) systems, network security is rapidly becoming a critical business concern. Due to the interconnectivity of IT systems, a comprehensive description of all of the key elements and relationships that make up an organization’s network security is needed, which can be referred as network security architecture. The value of this architecture is often questioned by organizations in terms of its practical application. This paper has presents a new approach to the network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be applied to a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Applying Zachman matrix provides the answers to what data assets the nuclear and research facilities controls, how they are used, and where they are located.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

An Approach to a New Network Security Architecture of Nuclear and Research Facilities

A.B. Ramadan
A.B. Ramadan
M. Hefnawi
M. Hefnawi

Research Journals