Volume 7, Issue 1, March 2019, Page: 10-15
An Approach to a New Network Security Architecture of Nuclear and Research Facilities
Abou Bakr Ramadan, Department of Siting and Environmental, Nuclear & Radiological Regulatory Authority, Cairo, Egypt
Mazhar Mahmoud Hefnawi, Department of Siting and Environmental, Nuclear & Radiological Regulatory Authority, Cairo, Egypt
Received: Jun. 9, 2019;       Accepted: Jul. 1, 2019;       Published: Jul. 13, 2019
DOI: 10.11648/j.se.20190701.12      View  563      Downloads  80
The advances in information technology (IT) systems and network security have become main necessary requirements for any business in current time and future. Any organization needs a full description of all the key elements and relationships for applying good IT systems and good network security. This is known as network security architecture. This architecture increases the capabilities of any organization in terms of its practical application. This work has a new approach to network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be implemented in a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Creating security architecture for nuclear and research facilities by the Zachman matrix (data, function, and network) provide the answers to what data assets the organization controls, how they are used, and where they are located. Nuclear facilities, as one of the major users of information and communication technology, present a good case study for applying the proposed architecture. Therefore the Zachman matrix provides the answers to what data assets the nuclear and research facilities controls by setting up the ideal use and ideal places for these data.
Computer Network, Local Area network Security, Zachman, Information Systems Architecture (ISA), Information Technology (IT)
To cite this article
Abou Bakr Ramadan, Mazhar Mahmoud Hefnawi, An Approach to a New Network Security Architecture of Nuclear and Research Facilities, Software Engineering. Vol. 7, No. 1, 2019, pp. 10-15. doi: 10.11648/j.se.20190701.12
Copyright © 2019 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Harmon P. Developing an enterprise architecture. Business Process Trends. Available at: http://database.ittoolbox.com/documents/document.asp?i=2385. 2002.
Salem W, Hefnawi M. Management of the Processes for Evaluating External Human Induced Events Using Operating Systems Concept. Journal of Operating Systems Development & Trends. 2018; 5 (2): 24–29p.
DeLooze LL. Applying security to an enterprise using the Zachman Framework. SANS Publications. Available at: http://www.sans.org/rr/paper.php?id=367. 2001.
Mohajerani MR, Moeini A. An approach to a new network security architecture for research environments. Proc. Of the 21st International SAFECOMP Conference, Italy. 2002.
Henning R, Corporation H. Use of the Zachman architecture for security engineering. Proc. of the 19th National Information Systems Security Conference, Baltimore, MD. 1996.
Firas Masoud, Mohammad Alchaita, Mohammad Assora. Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. American Journal of Electrical and Computer Engineering, SciencePG. 2017; 1 (1): 40-49. doi: 10.11648/j.ajece. 20170101.16.
Hey DC. A different kind of life cycle: the Zachman Framework. Essential Strategies Inc. Available at: http://www.essentialstrategies.com/documents/zachman2000.pdf. 2000.
James Lapalme, Aurona Gerberb, AltaVander Merwe, John Zachman, Marne De Vries, KnutHinkelmann. Exploring the future of enterprise architecture: A Zachman perspective. Computers in Industry, Elsevier 79 (2016) 103-113. http://dx.doi.org/10.1016/j.compind. 2015.06.010.
Greenwald M et al. Designing an research firewall: policy, practice and experience with SURF. IEEE Proceedings of 1966 Symposium of Network and Distributed Systems Security. 1996.
Ramachandran J. Designing security architecture solutions. Hoboken: John Wiley and Sons; 2002.
Heaney J et al. Information assurance for enterprise engineering. Proc. of the 9th Conference on Pattern Language of Programs, Monticello, Illinois. 2002.
Rosenthal M, Coopers P. Three-zone model to depict enterprise security & technology architectures. 28th Annual Computer Security Conference, Washington D. C. 2001.
Aroosa Umair, Muhammad Gufran Khan. Communication Technologies and Network Protocols of Automotive Systems. Advances in Networks, SciencePG. 2018; 6 (1): 58-65. doi: 10.11648/j.net. 20180601.15.
Henry Erialuode Amhenrior, Joy Omoavowere Emagbetere. Development of a System for Token Validation in a Prepayment Energy Meter from Wireless Recharge Source without a Server. Software Engineering, SciencePG. 2018; 6 (2): 56-62. doi: 10.11648/j.se. 20180602.14.
Mykola Pasyeka. Development of Data Warehouse Structure Model for Educational Process Management. Software Engineering, SciencePG. 2018; 6 (1): 1-6. doi: 10.11648/j.se. 20180601.11.
Browse journals by subject