By Topic

Security Measures in a Secure Computer Communications Architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Bottino, L.J. ; Fed. Aviation Adm., Atlantic City Int. Airport, NJ

The architecture of a computer communication system has evolved with advances in technology. Changes to satisfy telecommunication needs within the technical community have surfaced gradually through the efforts of international computer standards organizations, technical panels, and guidance committees. The design of a secure computer communications architecture to protect the integrity of information exchange is pursued by the aerospace industry, the commercial and financial sectors, and at all levels of government agencies. Banking institutions, the insurance and medical professions, goods and commodity exchanges, the airline industry, and local, state, and federal government agencies have all sought increased computer security and confidence in their computer communications. * Computer security techniques, defense methodologies, and security appliances are discussed and analyzed. These discussions will center on various computer and network security devices. With these devices, the foundations for a rigorous security policy can be created. Security policies are important in preventing compromises of network security and threats affecting secure computer communications. Vulnerabilities in computer networks are identified in terms of exploits. The deployment of scanning technologies can discover these exploits and their affects on the integrity of the information exchanged. These same technologies can assign risk factors and pose suggestions for corrective actions in the computer environment. A firewall system installation is deployed on the network of the enterprise to protect and secure a computer communications architecture. Intrusion detection techniques include signature identification of the intruder to locate and respond to network and host-based intruder attacks. Some of these same techniques will uncover the forensic evidence and explain how the computer or network system was compromised. Virtual Private Networks (VPNs) are another example of a security ap- - pliance. This network device employs security mechanisms such as tunneling, Internet protocol (IP) security protocols and cryptography. Insecure computer communications can have devastating consequences on national security, which would affect every aspect of daily life. To address the issue a secure computer communications architecture will be offered as an example to demonstrate the precautions that can be taken, display the benefits from a systems engineering viewpoint and present an economic feasibility with a view towards the future

Published in:

25th Digital Avionics Systems Conference, 2006 IEEE/AIAA

Date of Conference:

15-19 Oct. 2006