An Approach to a New Network Security Architecture of Nuclear and Research Facilities

A.B. Ramadan
A.B. Ramadan
M. Hefnawi
M. Hefnawi

Send Message

To: Author

An Approach to a New Network Security Architecture of Nuclear and Research Facilities

Article Fingerprint

ReserarchID

2WJK8

An Approach to a New Network Security Architecture of Nuclear and Research Facilities Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

With the growth of information technology (IT) systems, network security is rapidly becoming a critical business concern. Due to the interconnectivity of IT systems, a comprehensive description of all of the key elements and relationships that make up an organization’s network security is needed, which can be referred as network security architecture. The value of this architecture is often questioned by organizations in terms of its practical application. This paper has presents a new approach to the network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be applied to a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Applying Zachman matrix provides the answers to what data assets the nuclear and research facilities controls, how they are used, and where they are located.

References

10 Cites in Article
  1. P Harmon (2008). - Introduction: Enterprise Architecture and Technology Trends.
  2. L Delooze Applying security to an enterprise using the Zachman Framework.
  3. Mahdireza Mohajerani,Ali Moeini (2002). An Approach to a New Network Security Architecture for Academic Environments.
  4. R Henning,H Corporation Use of the Zachman architecture for security engineering.
  5. (1996). Reviewers - Volume 1.
  6. D Hey (2000). A different kind of life cycle: the Zachman Framework.
  7. M Greenwald,S Singhal,J Stone,D Cheriton (1996). Designing an academic firewall: policy, practice, and experience with SURF.
  8. J Ramachandran (2002). Designing security architecture solutions.
  9. J Heaney (2002). XDDP Patterns―A Pattern Language for eXtreme Derivative Development Process―.
  10. M Rosenthal,P Coopers (2001). Three-zone model to depict enterprise security & technology architectures.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

A.B. Ramadan. 2019. \u201cAn Approach to a New Network Security Architecture of Nuclear and Research Facilities\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJCST-G Volume 19 (GJCST Volume 19 Issue G3).

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-G Classification C.2.0
Version of record

v1.2

Issue date
August 7, 2019

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 5177
Total Downloads: 1302
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

An Approach to a New Network Security Architecture of Nuclear and Research Facilities

A.B. Ramadan
A.B. Ramadan
M. Hefnawi
M. Hefnawi

Research Journals