Information Systems Security: A Model for VPN Performance Evaluation

نویسندگان

  • Sid Sirisukha
  • Mikhail Kotykhov
چکیده

Virtual Private Network (VPN) protects information systems in enterprise organizations by building a security tunnel between the headquarters and branches, or from the headquarters to suppliers and customers. Proper and effective implementation can be evaluated by considering organizational effects and enterprise objectives. In this paper a research model is proposed to evaluate the performance of existing VPN systems. The approach adopts an Analytical Hierarchy Process (AHP) for complex, multi-criteria problems where both qualitative and quantitative aspects of a problem need to be incorporated. Suggestions for best decision-making, and clearly accessible evidence is presented to justify choices. The potential of this model is elaborated and performance expectations are raised for enterprise adoption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of 802.11g Architecture Using Security Protocols Based on Index Policy Method

Data security has a major role in the development of communication system as wireless local area networks (WLANs) are beginning to play a much larger role in corporate network environments. Wireless local area networks are very popular for home networking applications, therefore this increase in accessibility has created problems for data security.To deal with these problems stronger security m...

متن کامل

Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach

In this paper, we have focus existing and proposedWLAN security technologies designed to improve 802.11 standard by applying security policies. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying security policy to individual packet. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN test bed archit...

متن کامل

Quantitative Evaluation of Virtual Private Networks and its Implications for Communication Security in Industrial Protocols

Virtual Private Networks (VPNs) are widely recommended to provide security for otherwise unsecured industrial and SCADA communication protocols. VPNs provide confidentiality, integrity, and availability and are often considered secure. However, implementation vulnerabilities and protocol flaws have exposed VPN weaknesses in many deployments. In this work, we use probabilistic modeling to evalua...

متن کامل

ATM Security VPN Case Study

This paper describes various information security methods used today, as they relate to privacy. The various security methods are compared in terms of encryption strength, performance, delay/jitter, scalability, management, and inter-networking. Case studies of CellCase ATM VPN systems installations highlight the advantages of ATM-SEC based security over host-based or network layer security so...

متن کامل

How Effectiveness Of Comprehensive Performance Measurement Systems on Manager's Performance Through Modification of Mental Models (Learning Process)

One of the ways to reduce agency costs is to plan for the creation of effective decision-making information by designing appropriate comprehensive performance evaluation systems according to managers' learning process One of the important factors in the processing and classification of information for cognitive learning is mental models that are categorized in two dimensions of mental model co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004