Читать книгу Cyber Security and Network Security - Группа авторов - Страница 46

1.7 Conclusion

Оглавление

In our proposed model, we have suggested a system where data entry, data modification, and data management all are done through a client side application through which the data can be encrypted and sent over to the server side application. From the data encryption at transit to the data encryption at rest, everything is managed by the application itself. Here, in the suggested system design, we have implemented our concept in the form of an enterprise application to be used for communication between multiple levels of users. We have implemented a role-based access control/identity-based access control concept, depending on which different authorizations are allotted, which can be customized by higher levels of roles. Comparing with the existing systems, our system design is robust, scalable, and durable. The load is balanced between multiple availability zones, read-replicas are deployed, and autoscaling groups are deployed keeping the sudden increase of users in mind. Our system design proposes a much more secure way of transmission of classified data across networks, thus keeping the integrity of the data durable.

Cyber Security and Network Security

Подняться наверх