Securing Network Connected Applications with Proposed Security Models
Serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies. Within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
IP based Patient Monitoring System
This Project is to suggest an IP based Patient Monitoring System (PMS) with an Open Architecture Approach Theory (OAAT). The PMS is based on latest buses connectivity, especially by using the TCP/IP protocol suite as an internal bus instead of the traditional design like HPIB, Profi-bus and CAN bus etc.
The TCP/IP protocol suite is easily available in very cheap price, so it is good approach to use TCP/IP protocol suite as internal bus for reducing the cost effectiveness. The TCP/IP protocol suite based architecture systems are capable to upgrade the PMS’s firmware and software through dedicated TCP/IP protocols suite via open communication network.
The patient monitoring is a very critical monitoring system, it can monitor physiological signals including electrocardiograph (ECG), Respiration Rate, Invasive and Non-Invasive Blood Pressure, Oxygen Saturation in Human Blood (SpO2), Body Temperature and other Gases etc. During patient treatment, the PMS is to monitor continuously vital physiological signs of the patient. It is quite hard job for medical personnel to monitor each patient for 24 hours.
Web System Security
There is growing concern about current web security development. This project looks at common web system designs, the security threats to such designs and the security requirements for a networked system, thus understanding the problems of web system security.
The project then analyzes how available security technologies answer the web security problems. The current security technologies can be classified as core security technologies, which provide required security service, and web system specific security technologies, which are the technologies that fit directly into web system security scenario.
The analysis shows that current protocol design of the web – HTTP protocol and underlying infrastructure provide almost no security services. Fortunately, add-in security technologies are available with their advantages and disadvantages. The framework is then presented trying to make the most secure web system out of available technologies. Further researches show unsolved security problems and possible direction.
Network Admission Control (NAC) Securing End Point Devices
There have been remarkable growths in wireless communication networks in recent years; this is because of its merits over the wired networks such as Mobility and convenience. Wireless networks transmit the signal over the open air via radio waves of different frequencies, this makes it to be vulnerable to several attacks and anybody on the street can easily intercept the wireless data or inject new data into the entire network.
There has been existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which was designed for wireless network security. There were concerns of security vulnerabilities in WEP; this made it necessary for the implementation of another solution to overcome the weaknesses of the previous wireless network security. The IEEE 802.1X (port-based network admission control) which is defined on Extensible Authentication protocol (EAP) provides effective and efficient admission control to wireless and other networks devices.