Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/108615
Title: | Enterprise Network Security Architecture Strategy Evaluation |
Researcher: | Mirashe, Shivaji Pandurangrao |
Guide(s): | Dr. Kalyankar, N. V. |
Keywords: | Network security |
University: | Swami Ramanand Teerth Marathwada University |
Completed Date: | 30/10/2015 |
Abstract: | Now days ENSASE is a crucial field which is gaining lots of attention as the internet is growing day by day. The Internet security threats and internet protocols were introduced for the sake of network security. The network is basically a security software based technology, but various common hardware devices are also used. Though there is an improvement in the present network security, but that is not very promising. newlineThere is wide scope to ENSASE to improve Network Security services and its performance. With these study findings and the recommendations the ENSASE will be benefited with improved Security with quality. You need to deploy to a High Performance Data Center Firewall or ENSASE, an Enterprise Next Generation Firewall. newlineDepending on the study, the researcher feels that more efforts need to be taken in understanding security in High Level Category than Medium Level Category and Medium Level Category requires more security than Low level Category. newlineThe amount invested in IT Sector by various organizations significantly differs and that is not influenced by firm size i.e. in terms of revenue and total number of employees working in the organization. Second point is the strategic benefit varies with organization types. Third point is, the way in which employees adapt to the IT implementation changes with the firm size. Based on the study and findings there were some benchmarks metrics propagated for the benefits, risks and costs of IT. The metrics suggested can be used as a reference point for benchmarking, which should form an essential component in the IT evaluation and learning process. newlineFinally to conclude, the researcher feels that although It is a small step taken by researcher to understand the Enterprise network security Architecture Strategy evaluation, there should be a high performance, conceptual and procedural security structure to guard various high level, medium level and low level organization data. This includes large offices, banks, data centers, branch networks, remote data centers. |
Pagination: | p251 |
URI: | http://hdl.handle.net/10603/108615 |
Appears in Departments: | School of Computational Sciences |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 110.82 kB | Adobe PDF | View/Open |
02_certificate.pdf | 140.94 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 82.48 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 152.51 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 159.59 kB | Adobe PDF | View/Open | |
06_contents.pdf | 237.87 kB | Adobe PDF | View/Open | |
07_list_of_tables.pdf | 85.43 kB | Adobe PDF | View/Open | |
08_list_of_figures.pdf | 85.74 kB | Adobe PDF | View/Open | |
09_ chapter1.pdf | 1.5 MB | Adobe PDF | View/Open | |
10_chapter2.pdf | 641.38 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 363.64 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 307.21 kB | Adobe PDF | View/Open | |
13_chapter6.pdf | 174.12 kB | Adobe PDF | View/Open | |
14_chapter5.pdf | 277.25 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 84.98 kB | Adobe PDF | View/Open | |
16_summary.pdf | 447.47 kB | Adobe PDF | View/Open | |
17_bibliography.pdf | 712.42 kB | Adobe PDF | View/Open | |
18_appendix.pdf | 389.25 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: