Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/108615
Title: Enterprise Network Security Architecture Strategy Evaluation
Researcher: Mirashe, Shivaji Pandurangrao
Guide(s): Dr. Kalyankar, N. V.
Keywords: Network security
University: Swami Ramanand Teerth Marathwada University
Completed Date: 30/10/2015
Abstract: Now days ENSASE is a crucial field which is gaining lots of attention as the internet is growing day by day. The Internet security threats and internet protocols were introduced for the sake of network security. The network is basically a security software based technology, but various common hardware devices are also used. Though there is an improvement in the present network security, but that is not very promising. newlineThere is wide scope to ENSASE to improve Network Security services and its performance. With these study findings and the recommendations the ENSASE will be benefited with improved Security with quality. You need to deploy to a High Performance Data Center Firewall or ENSASE, an Enterprise Next Generation Firewall. newlineDepending on the study, the researcher feels that more efforts need to be taken in understanding security in High Level Category than Medium Level Category and Medium Level Category requires more security than Low level Category. newlineThe amount invested in IT Sector by various organizations significantly differs and that is not influenced by firm size i.e. in terms of revenue and total number of employees working in the organization. Second point is the strategic benefit varies with organization types. Third point is, the way in which employees adapt to the IT implementation changes with the firm size. Based on the study and findings there were some benchmarks metrics propagated for the benefits, risks and costs of IT. The metrics suggested can be used as a reference point for benchmarking, which should form an essential component in the IT evaluation and learning process. newlineFinally to conclude, the researcher feels that although It is a small step taken by researcher to understand the Enterprise network security Architecture Strategy evaluation, there should be a high performance, conceptual and procedural security structure to guard various high level, medium level and low level organization data. This includes large offices, banks, data centers, branch networks, remote data centers.
Pagination: p251
URI: http://hdl.handle.net/10603/108615
Appears in Departments:School of Computational Sciences

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File110.82 kBAdobe PDFView/Open
02_certificate.pdf140.94 kBAdobe PDFView/Open
03_abstract.pdf82.48 kBAdobe PDFView/Open
04_declaration.pdf152.51 kBAdobe PDFView/Open
05_acknowledgement.pdf159.59 kBAdobe PDFView/Open
06_contents.pdf237.87 kBAdobe PDFView/Open
07_list_of_tables.pdf85.43 kBAdobe PDFView/Open
08_list_of_figures.pdf85.74 kBAdobe PDFView/Open
09_ chapter1.pdf1.5 MBAdobe PDFView/Open
10_chapter2.pdf641.38 kBAdobe PDFView/Open
11_chapter3.pdf363.64 kBAdobe PDFView/Open
12_chapter4.pdf307.21 kBAdobe PDFView/Open
13_chapter6.pdf174.12 kBAdobe PDFView/Open
14_chapter5.pdf277.25 kBAdobe PDFView/Open
15_conclusion.pdf84.98 kBAdobe PDFView/Open
16_summary.pdf447.47 kBAdobe PDFView/Open
17_bibliography.pdf712.42 kBAdobe PDFView/Open
18_appendix.pdf389.25 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.