Modeling Network Security: Case Study of Email System

03/30/2020
by   Sabah Al-Fedaghi, et al.
0

We study operational security in computer network security, including infrastructure, internal processes, resources, information, and physical environment. Current works on developing a security framework focus on a security ontology that contributes to applying common vocabulary, but such an approach does not assist in constructing a foundation for a holistic security methodology. We focus on defining the bounds and creating a representation of a security system by developing a diagrammatic representation (i.e. a model) as a means to describe computer network processes. The model, referred to a thinging machine, is a first step toward developing a security strategy and plan. The general aim is to demonstrate that the representation of the security system plays a key role in making thinking visible through conceptual description of the operational environment, a region in which active security operations are undertaken. We apply the proposed model for email security by conceptually describing a real email system.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 4

page 5

page 6

page 8

07/16/2020

Conceptual Modeling of Time for Computational Ontologies

To provide a foundation for conceptual modeling, ontologies have been in...
12/03/2018

Conceptual Modeling of Inventory Management Processes as a Thinging Machine

A control model is typically classified into three forms: conceptual, ma...
09/25/2020

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

National disasters can threaten national security and require several or...
09/24/2019

Data Interpretation Support in Rescue Operations: Application for French Firefighters

This work aims at developing a system that supports French firefighters ...
10/16/2020

SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers

In this paper we introduce SAIBERSOC, a tool and methodology enabling se...
09/30/2019

Authentication Modeling with Five Generic Processes

Conceptual modeling is an essential tool in many fields of study, includ...
11/28/2018

Tracking Systems as Thinging Machine: A Case Study of a Service Company

Object tracking systems play important roles in tracking moving objects ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.