Modeling network security: Case study of email system

3Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

We study operational security in computer network security, including infrastructure, internal processes, resources, information, and physical environment. Current works on developing a security framework focus on a security ontology that contributes to applying common vocabulary, but such an approach does not assist in constructing a foundation for a holistic security methodology. We focus on defining the bounds and creating a representation of a security system by developing a diagrammatic representation (i.e. a model) as a means to describe computer network processes. The model, referred to a thinging machine, is a first step toward developing a security strategy and plan. The general aim is to demonstrate that the representation of the security system plays a key role in making thinking visible through conceptual description of the operational environment, a region in which active security operations are undertaken. We apply the proposed model for email security by conceptually describing a real email system.

Cite

CITATION STYLE

APA

Al-Fedaghi, S., & Alnasser, H. (2020). Modeling network security: Case study of email system. International Journal of Advanced Computer Science and Applications, 11(3), 99–107. https://doi.org/10.14569/ijacsa.2020.0110312

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free