A Security analysis To Be Technology Architecture for Ministry of Regional Municipalities and Water Resources (MRMWR) Sultanate of Oman

BoumedyenShannaq, Richmond Adebiaye

Abstract

The proposed work developed critical strategy to solve basic problem; the Violation performance of individual services by constructing attack graphs, and automatic extraction and verification (analysis) properties of this graph allows to partially solve such problems .Furthermore describes the security architecture, processes and organization structure of security analysis system (SAS), for the Ministry of Regional Municipalities and Water Resources (MRMWR) in sultanate of Oman. The proposed architecture is derived based on the current state assessment of the IT infrastructure, the future strategic direction and leading practices principles that consider the development of architecture, models and security analysis system (SAS), based on the formation of attack graph and the calculation of a variety of security metrics. Keywords

References

Boumedyen Shannaq , Richmond Adebiaye,” Schemes for Distributed Computing Environment Based on Cloud Computing Technology for Ministry of Regional Municipalities and Water Resources (MRMWR) Oman”, International Journal of Engineering Inventions eISSN: 2278-7461, p-ISSN: 2319-6491 Volume 6, Issue 1 (Jan 2017) PP: 01-06.

Security Awareness Program Special Interest Group PCI Security Standards Council, October 2014.

Martin P. Clark,” Networks and Telecommunications: Design and Operation, 2nd Edition ”, SBN: 978-0-471-97346-1,1997

Oracle9i Security Overview Release 2 (9.2) Part Number A96582-01, Data Security Challenges,2002.

Cyber attack techniques and defense mechanisms, institute for security technology studies at dartmouth college investigative research for infrastructure assurance group,2002

Haifeng Zhou, Chunming Wu, Ming Jiang, Min Huang,” Evolving Defense Mechanism for Future Network Security ”, IEEE Communications Magazine 53(4):45-51 · April 2015

Boumedyen Shannaq,” Methods and Algorithms for Searching Arabic Name Entity”, International Journal of Computer Applications, Volume 82 - Number 8, 2013.

Boumedyen Shannaq, Devanshi Thakkar ,” On the Development of Neural Network Models Using Data Mining Tools”, Asian Journal Of Computer Science And Information Technology, 2012

P.P.Kokorin , Boumedyen A.N. Shannaq ,”Methods of texts normalization and ontological clustering of texts” , ,VAX UDC ,information-measuring and operating systems Journal, http://www.radiotec.ru/catalog.php?cat=jr.(2010)

Vasilios Zarikas1 , Nick Papanikolaou2 , Michalis Loupis3 , Nick Spyropoulos,” Intelligent Decisions Modeling for Energy Saving in Lifts: An Application for Kleemann Hellas Elevators”, Energy and Power Engineering, 2013, 5, 236-244

KIzz,”Guide to Computer Network Security, Security Assessment, Analysis, and Assurance”,2017. [

Boumedyen , John ,Richmond, "BWA_Thesaurus as knowledge management strategy for Arabic and English Tourism Webpage's " WCAS the international Conference ICKMARS2012. [14]

Boumedyen ,John ,Jambak , "Taxonomic Knowledge Management Strategy for Managing Market Basketing " presented in WCAS the international Conference ICKMARS-2012, published in Journal of Current Computer Science and Technology ,Vol 3, No 1 (2013). This paper awarded the appreciated paper out of 51 papers

Check out our ecommerce solutions

next
prev