Abstract

The architecture of a computer communication system has evolved with advances in technology. Changes to satisfy telecommunication needs within the technical community have surfaced gradually through the efforts of international computer standards organizations, technical panels, and guidance committees. The design of a secure computer communications architecture to protect the integrity of information exchange is pursued by the aerospace industry, the commercial and financial sectors, and at all levels of government agencies. Banking institutions, the insurance and medical professions, goods and commodity exchanges, the airline industry, and local, state, and federal government agencies have all sought increased computer security and confidence in their computer communications. * Computer security techniques, defense methodologies, and security appliances are discussed and analyzed. These discussions will center on various computer and network security devices. With these devices, the foundations for a rigorous security policy can be created. Security policies are important in preventing compromises of network security and threats affecting secure computer communications. Vulnerabilities in computer networks are identified in terms of exploits. The deployment of scanning technologies can discover these exploits and their affects on the integrity of the information exchanged. These same technologies can assign risk factors and pose suggestions for corrective actions in the computer environment. A firewall system installation is deployed on the network of the enterprise to protect and secure a computer communications architecture. Intrusion detection techniques include signature identification of the intruder to locate and respond to network and host-based intruder attacks. Some of these same techniques will uncover the forensic evidence and explain how the computer or network system was compromised. Virtual Private Networks (VPNs) are another example of a security appliance. This network device employs security mechanisms such as tunneling, Internet protocol (IP) security protocols and cryptography. Insecure computer communications can have devastating consequences on national security, which would affect every aspect of daily life. To address the issue a secure computer communications architecture will be offered as an example to demonstrate the precautions that can be taken, display the benefits from a systems engineering viewpoint and present an economic feasibility with a view towards the future

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call