| Peer-Reviewed

An Approach to a New Network Security Architecture of Nuclear and Research Facilities

Received: 9 June 2019    Accepted: 1 July 2019    Published: 13 July 2019
Views:       Downloads:
Abstract

The advances in information technology (IT) systems and network security have become main necessary requirements for any business in current time and future. Any organization needs a full description of all the key elements and relationships for applying good IT systems and good network security. This is known as network security architecture. This architecture increases the capabilities of any organization in terms of its practical application. This work has a new approach to network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be implemented in a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Creating security architecture for nuclear and research facilities by the Zachman matrix (data, function, and network) provide the answers to what data assets the organization controls, how they are used, and where they are located. Nuclear facilities, as one of the major users of information and communication technology, present a good case study for applying the proposed architecture. Therefore the Zachman matrix provides the answers to what data assets the nuclear and research facilities controls by setting up the ideal use and ideal places for these data.

Published in Software Engineering (Volume 7, Issue 1)
DOI 10.11648/j.se.20190701.12
Page(s) 10-15
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Computer Network, Local Area network Security, Zachman, Information Systems Architecture (ISA), Information Technology (IT)

References
[1] Harmon P. Developing an enterprise architecture. Business Process Trends. Available at: http://database.ittoolbox.com/documents/document.asp?i=2385. 2002.
[2] Salem W, Hefnawi M. Management of the Processes for Evaluating External Human Induced Events Using Operating Systems Concept. Journal of Operating Systems Development & Trends. 2018; 5 (2): 24–29p.
[3] DeLooze LL. Applying security to an enterprise using the Zachman Framework. SANS Publications. Available at: http://www.sans.org/rr/paper.php?id=367. 2001.
[4] Mohajerani MR, Moeini A. An approach to a new network security architecture for research environments. Proc. Of the 21st International SAFECOMP Conference, Italy. 2002.
[5] Henning R, Corporation H. Use of the Zachman architecture for security engineering. Proc. of the 19th National Information Systems Security Conference, Baltimore, MD. 1996.
[6] Firas Masoud, Mohammad Alchaita, Mohammad Assora. Secure Device to Device Communications for Next-Generation Networks Using Software-Defined Network. American Journal of Electrical and Computer Engineering, SciencePG. 2017; 1 (1): 40-49. doi: 10.11648/j.ajece. 20170101.16.
[7] Hey DC. A different kind of life cycle: the Zachman Framework. Essential Strategies Inc. Available at: http://www.essentialstrategies.com/documents/zachman2000.pdf. 2000.
[8] James Lapalme, Aurona Gerberb, AltaVander Merwe, John Zachman, Marne De Vries, KnutHinkelmann. Exploring the future of enterprise architecture: A Zachman perspective. Computers in Industry, Elsevier 79 (2016) 103-113. http://dx.doi.org/10.1016/j.compind. 2015.06.010.
[9] Greenwald M et al. Designing an research firewall: policy, practice and experience with SURF. IEEE Proceedings of 1966 Symposium of Network and Distributed Systems Security. 1996.
[10] Ramachandran J. Designing security architecture solutions. Hoboken: John Wiley and Sons; 2002.
[11] Heaney J et al. Information assurance for enterprise engineering. Proc. of the 9th Conference on Pattern Language of Programs, Monticello, Illinois. 2002.
[12] Rosenthal M, Coopers P. Three-zone model to depict enterprise security & technology architectures. 28th Annual Computer Security Conference, Washington D. C. 2001.
[13] Aroosa Umair, Muhammad Gufran Khan. Communication Technologies and Network Protocols of Automotive Systems. Advances in Networks, SciencePG. 2018; 6 (1): 58-65. doi: 10.11648/j.net. 20180601.15.
[14] Henry Erialuode Amhenrior, Joy Omoavowere Emagbetere. Development of a System for Token Validation in a Prepayment Energy Meter from Wireless Recharge Source without a Server. Software Engineering, SciencePG. 2018; 6 (2): 56-62. doi: 10.11648/j.se. 20180602.14.
[15] Mykola Pasyeka. Development of Data Warehouse Structure Model for Educational Process Management. Software Engineering, SciencePG. 2018; 6 (1): 1-6. doi: 10.11648/j.se. 20180601.11.
Cite This Article
  • APA Style

    Abou Bakr Ramadan, Mazhar Mahmoud Hefnawi. (2019). An Approach to a New Network Security Architecture of Nuclear and Research Facilities. Software Engineering, 7(1), 10-15. https://doi.org/10.11648/j.se.20190701.12

    Copy | Download

    ACS Style

    Abou Bakr Ramadan; Mazhar Mahmoud Hefnawi. An Approach to a New Network Security Architecture of Nuclear and Research Facilities. Softw. Eng. 2019, 7(1), 10-15. doi: 10.11648/j.se.20190701.12

    Copy | Download

    AMA Style

    Abou Bakr Ramadan, Mazhar Mahmoud Hefnawi. An Approach to a New Network Security Architecture of Nuclear and Research Facilities. Softw Eng. 2019;7(1):10-15. doi: 10.11648/j.se.20190701.12

    Copy | Download

  • @article{10.11648/j.se.20190701.12,
      author = {Abou Bakr Ramadan and Mazhar Mahmoud Hefnawi},
      title = {An Approach to a New Network Security Architecture of Nuclear and Research Facilities},
      journal = {Software Engineering},
      volume = {7},
      number = {1},
      pages = {10-15},
      doi = {10.11648/j.se.20190701.12},
      url = {https://doi.org/10.11648/j.se.20190701.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.se.20190701.12},
      abstract = {The advances in information technology (IT) systems and network security have become main necessary requirements for any business in current time and future. Any organization needs a full description of all the key elements and relationships for applying good IT systems and good network security. This is known as network security architecture. This architecture increases the capabilities of any organization in terms of its practical application. This work has a new approach to network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be implemented in a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Creating security architecture for nuclear and research facilities by the Zachman matrix (data, function, and network) provide the answers to what data assets the organization controls, how they are used, and where they are located. Nuclear facilities, as one of the major users of information and communication technology, present a good case study for applying the proposed architecture. Therefore the Zachman matrix provides the answers to what data assets the nuclear and research facilities controls by setting up the ideal use and ideal places for these data.},
     year = {2019}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - An Approach to a New Network Security Architecture of Nuclear and Research Facilities
    AU  - Abou Bakr Ramadan
    AU  - Mazhar Mahmoud Hefnawi
    Y1  - 2019/07/13
    PY  - 2019
    N1  - https://doi.org/10.11648/j.se.20190701.12
    DO  - 10.11648/j.se.20190701.12
    T2  - Software Engineering
    JF  - Software Engineering
    JO  - Software Engineering
    SP  - 10
    EP  - 15
    PB  - Science Publishing Group
    SN  - 2376-8037
    UR  - https://doi.org/10.11648/j.se.20190701.12
    AB  - The advances in information technology (IT) systems and network security have become main necessary requirements for any business in current time and future. Any organization needs a full description of all the key elements and relationships for applying good IT systems and good network security. This is known as network security architecture. This architecture increases the capabilities of any organization in terms of its practical application. This work has a new approach to network security architecture by using the Zachman Framework capabilities. The network security architecture of nuclear and academic facilities academic centers is discussed to show how a conceptual model can be implemented in a real organization. This new approach makes any Local Area Network LAN more secure and more flexible than any conventional security procedures without affecting the performance of the LAN. Creating security architecture for nuclear and research facilities by the Zachman matrix (data, function, and network) provide the answers to what data assets the organization controls, how they are used, and where they are located. Nuclear facilities, as one of the major users of information and communication technology, present a good case study for applying the proposed architecture. Therefore the Zachman matrix provides the answers to what data assets the nuclear and research facilities controls by setting up the ideal use and ideal places for these data.
    VL  - 7
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • Department of Siting and Environmental, Nuclear & Radiological Regulatory Authority, Cairo, Egypt

  • Department of Siting and Environmental, Nuclear & Radiological Regulatory Authority, Cairo, Egypt

  • Sections