Guidelines to Develop a New Generalized Discriminate Secure network Model to Promote Secure and Optimal Network Communication in Institutions

- The computer network utilityis an important component in educational institutions as classes are conducted in smart classrooms, accessing study materials, conduct of online examinations, maintaining e-governance systems, etc., are getting in to day to day activities of Institutions. Nevertheless, assessment mark entries in online portals by Institutions, conducting online certification courses and conducting government examinations[1] are also taken places as Institutions’ activities occasionally. Amidst all, the security of communication which must be ensured while communication takes place is not under such attention now a day. Users,inside the institutions often annoy because of insecurity, losing data, andambiguity caused by Hijacks, network errors and spamware attacks[2]. Network Hackers and Malware Programmers still stand in their position of making fail the systems and stealing the information even though very powerful tools such as firewalls, Anti spamwares, Anti viruses, etc., invented.In this scenario, guidelines comes out from the complete review with currently available anti spamware tools[3] are expected and that must produce the secure forts over the networks. In this paper a guideline for creating a new generalized discriminated secure e-governance model is proposed to keep the security ON until the network switched OFF. This guideline was devised after thorough scrutiny of rated antiviruses in all aspects and it has strong steps to prohibit the entire network from the attackers. Initially set of questionnaire were given to reputed institutions and obtained filled in questionnaire forms for bringing in to further process. With these, the guideline which provides how do keep the networks more secure could be devised as well.

The networks in institutions are affected a lot because of intruders and network errors. Which causes to data lose, connection loss, insecure environment [7], wastage of time since system hanging, delay at work, etc. with this institutions will not be able to have a consistent and durable network facility that they must have. Network security issues are identified in several circumstances as a route cause for lacking to provide consistent network [8]. Researches are carrying out in many places aim to keep the network in durable zone. But that researches have come with the question whether they have been achieved the aim or not, and the reason if not achieved. Since the technology grows both in right and unethical ways,no one can declare that they are in secure zone where intruders not able to get into. One's secure zone at present may become insecure soon [9]. So the deployment of anti-harming units is vain unless otherwise they get updated and upgradedoften as well. How the system faces failures to keep its data safe is clearly indicated in figure.1. The hacker sits in cafe and from there he could hack the system of any institution when it is not under secure pavement. In figure.1 a system with IP 192.125.4.3 is hacked for stealing data from the intruder who sits in cafe. Though the current scenario at several places as described above [10], In rated corporate various studies are taken for keeping the network safe and protecting the data with high privacy. The following topics cover the complete review concerning at most level of security to sort out the issues which are caused by insecure context [11].

II. AGGREGATING THE CURRENT SECURITY ISSUES
Despite the security issues raising in industries in such aspects the issues are threatening the institutions were taken in to account as our objectives have been established for that. Initially the questionnaire [12] was given to the institutions for assessing the issues which are currently in rates. Table I and figure2 show the questionnaire table and the flow chart of that respectively [13]. They show literally that the variance between the users and the maximum of answer taken in to account for further study extensions.

III. AWARENESS ON NETWORKS SECURITY AND THE INVADERS
Security is a process that protecting the things and not to get harmed. Things can be represented by any, they can be appliances, gadgets, PCs, PlayStations, [14]etc., basically the consumers don't have knowledge about the security due to lack of awareness in terms of How can we provide the security to any system and the importance?, and educate the consumer about security is a responsibility of one who provide users the device or an network to be used. Sometimes network security is concerned that the system gets failure even if it is under the network engineers or system engineers [15]. Hence the awareness about the security is necessary to those who are using the systems inside the organizations which can yield them at least withthe knowledge about preserving data as harmless. Here we describe the strategy for making awareness among the users inside the organizations and that comprises the following three 'P' levels in order to make the users bright in secure network maintenance.
1)Purpose : The purpose behind the security 2)Protection : The protection which can pave the network not to become harm 3)Persistence : The persistence which is to be followed to show consistency in network security The above discussed three 'p's are to be conveyed to users briefly in between the establishment of network and the first user starts his work with the new network. Bringing awareness on Protection provide them an ignition to let them to enlarge their knowledge in counter action to safe their network [16]. The following are the simple way to get educated the users on security course that are already in the market.  In figure.3 the security model that provides awareness to the users' community are plotted clearly. Those four levels are influencing so much of elements which are useful to the network. Level-I consists of recent computer operating system, storage, TCP/IP and its application, and it guides us the recent configuration of the peripherals and gadgets. In level-II information Technology,security tools and techniques are described.The security tools proclaim the software, hardware and techniques altogether to protect the network from threats. Level-III consists all cybercrimes avoidance like identifying theft, white collar crimes identification, online scams findings, etc., The last level level-IVis having the detail explanation of ERP, online applications, threats and harmful viruses. After gone through this course the network users of the institutions are aware of the information security and their invaders.

IV. A NEW GENERALIZED DISCRIMINATE SECURE NETWORK MODEL GUIDELINES Guideline 1: E-Governance
 For havingthe centralized E-governance policy in the institution, It must have the effective cooperation between management and employees During the review of the existing E-Governance, It was identified that security programmes are not well satisfied their requirements as it is devised by both management and users of the Institutions, so as to make the results of misunderstanding [17].

Guidelines 2: Security policy & framework
This is the guidelines about cyber law since it is important whenever anyone wants to get in to the communication and it is even starts from simple SMS [18] services to video conferences.
 Enhance the current security policy inside the institutions  To establish new security policy if the old one is not fulfilling the requirements  The security policy has to ensure the objective of the security such as 1)confidentiality 2)integrity and 3)availability of the information

Guidelines 3: Cyber Security Technology
This Guideline is based on the cyber security technology as bulletin below  Creating a cyber-security technology that materializing the requirementsof information security [19].  Produce training progrmmesto users if the tools are new Now a day lot of hardware and software are purposely made for defending the cyber threats in network, this kind of things can be taught to the users.

Guidelines 4:Background of Security Building
This guideline that processes on the human aspect  To maintain a high level security and following the security policy  To Circulate the security policy among the users and Participants To promote a cyber-security it is required a leadership quality and involvement towards the policy group materializing [21].

Guidelines 5: Research and Development
To achieve the objective of the security the organization should take care of Network Security Research and Development [22]. To develop the security policy and toachieve the goal, the objectives of the guidelines must be as  To enlarge the security policy  To strength the security policy The outcome of the research and development could be an intellectual property of institutions and it is also protect the institution's network.

Guidelines 6: Inter Coordination
The security environment interconnection is a sixth policy and is not come from a single head; it has to be accepted by all users of the institutions[23]. The inter coordination is explained in the figure 4. The objective of this guideless are  Encourage volunteer participants of employee  Promote simple guidelines for understanding Figure.4: CAVM approach for inter coordination V. Conclusion Tedious is a job of providing security even to the system engineers. For their convenience by this paper a guideline for creating a new generalized discriminated secure model is devised to keep the security ON until the network switched OFF. As the discussions were in all possible security threatens, this guideline was devised and after thorough scrutiny of rated antiviruses in all aspects, it contains strong steps to prohibit the entire network from the attackers. Initially set of questionnaire were given to reputed institutions and obtained filled in questionnaire forms for bringing in to further process. Secondly, the awareness was created across the network users on the secure network and the invaders. Finally, the guideline which provides how keep the networks more secure could be possibly devise as well and it has been concluded that the guideline defends the network from invaders in several aspects. Reference