advertise your website Login Registration
 
 
 
Submission Guidelines Recent Approved Articles Featured Articles
Submit Free Article
Home About Us Advertising GuideLines Do's & Don't T & C FAQ Contact us
  Home Computers & Technology Articles Software Articles
 
HostJinni Promotions
Articles Category
Arts & Entertainment
Automotive
Business
Cancer
Careers
Communications
Computers & Technology
Finance
Food & Drink
Gaming
Health & Fitness
Home & Family
Home Based Business
Home Improvement
Insurance
Just for Women
Kids & Teens
Legal
News & Society
Online Business
Online Tickets
Pets
Real Estate
Reference and Education
Relationships
Self Improvement
Shopping
Sports & Recreation
Travel & Tourism
Writing
  Member Area
Author Login
Free Registration
Authors From Country
 
  Helpful Topics
How to Write Articles
Free Early Approval Tips
Why Article Submission
 
  Best of Webzine
Leader Board
Most Viewed Articles
Top Rated Articles
Archive
  WebZine Status
Total Articles -25441
Registered Authors - 4576
Featured Articles - 340
Articles added this
month - 0
 

How Open System Adapter Express (OSA-E) Secures Your Organization From Network Security Threats?

    -    
Secure data sharing over an enterprise network is a constant challenge for organizations as it involves dealing with many potential threats during data transfers. If any critical or confidential data is stolen or misplaced while sharing, it can cost a fortune for an organization to cope up with it. So, organizations should be aware of the threats associated with the data transfers over the network and the countermeasures in order to secure the data.

Open System Adapter Express (OSA-E) is associated with mainframe system that helps you share information across the network securely. In this article, we discuss the possible threats to the data that is being transmitted in a network and how OSA-E handles them and enables secure data transmission across the network.

Possible threats to organizational network

Intrusion: Intrusion refers to an unauthorized entry into a network and accessing the files and directories of the network. By intruding one system, attacker will be able to access the data and files from other devices that are connected to the same network.

Denial of service: Denial of service or DoS means not allowing a user or a system to get connected with the network. Thus, sharing and communication is not possible without connection to network.

Message modification: Message modification means manipulating the message or data while it is being transmitted. The data received by the receiver is not the same that was sent by the sender.

Traffic monitoring: This refers to the attackers monitoring the events that are taking place in the network. They get to know all the information of the network, including confidential data.

Impersonation: Impersonation refers to changing the sender's address in the packet (data is usually transmitted in the form of packets in a network) and misleading the receiver/receivers.

The above mentioned are the five possible and the most common threats to any network. Some of these threats can be avoided by using individual physical connections between every communicating system; but it will be very expensive, even for big organizations.

Securing organizational network using OSA Express
Open System Adapter Express (OSA-E) is a physical part of mainframe that helps your organization from possible network threats. OSA-E of a mainframe system connects the system to external LANs (Local Area Networks) and it can be shared among the systems in the network. It acts as internal VLAN between the devices that are sharing the same OSA-E. VLAN – one physical LAN connection is divided into number of virtual connections.

OSA prevents network threats by supporting VLAN (Virtual Local Area Networks) technology. It secures data in a network by securing virtual networks and maintaining network integrity.

Securing virtual networks
First, LAN is divided into number of virtual connections or VLANs and each VLAN contains an ID. Switch, which is used to set up LAN network knows all VLAN IDs. So, whenever a data is sent from one device to another in the network, OSA attaches that ID and switch directs it strictly to that receiver, it is meant to.

In this way, OSA-E regulates the transactions across the network properly based on the VLAN IDs.

Maintaining network integrity
Data packets contain "Header checksums" that are used to verify data integrity. Header checksums are nothing but values that are assigned to data packet depending on the contents of the packet.

OSA-E helps TCP/IP stack on the sending side to calculate the header checksum value and attaches it to the data packet that should be sent to the receiver.

On the other hand, OSA-E helps TCP/IP stack on the receiving side to validate the header checksum of the data packet and compares it with the checksum value when it was sent. If both are matching, then no data is lost.

This way, OSA Express secures the data from being lost, unauthorized access and manipulation of data that is being transmitted in the network.
 
Like this article..? Rate it here:  Votes | Average: 1 out of 5  Votes | Average: 2 out of 5  Votes | Average: 3 out of 5  Votes | Average: 4 out of 5  Votes | Average: 5 out of 5     0 votes, average: out of 5    
About Author
   
Articles Stats
  Published Date - September 20 2013
  Total Views - 24
  Total Votes - 0
  Average Rating - 0
  Comments - 0
  Mr. Williams J Peterson
Since 1982, Software Diversified Services (SDS) is providing first-quality software and technical support for IBM mainframes and VM, VSE, and mainframe. SSH SFTP from SDS secures ftp transactions on the mainframe network. At sdsusa.com you can find product trials and webcasts of other mainframe software tools from Software Diversified Services.
 
Particular Article
 
Author Article
  • How Open System Adapter Express (OSA-E) Secures Your Organization from Network Security Threats?
  • [2013-09-20 ]
    Secure data sharing over an enterprise network is a constant challenge for organizations as it involves dealing with many potential threats during data transfers. Read More...
  • Cryptography on Mainframe Systems
  • [2013-09-20 ]
    Mainframe system stores critical information of an organization; it communicates and coordinates with numerous devices that are connected to it in a network. Read More...
  • Encryption Basics
  • [2013-09-09 ]
    Encryption is a privacy scheme to convert plain text into a non-readable form, called cypher-text, which cannot be understood by the unauthorized users. Read More...
  • Computer Inventory on the Organization’s Network
  • [2013-09-09 ]
    Nowadays, the market is overfilled with programs of different price tiers and functionality. Often, the head managers get into difficulties trying to choose the best one among the dozens of tools. Read More...
  • Mainframe REXX
  • [2013-08-10 ]
    The Base Control Program (BCP) or MVS is the z/OS base element, which provides essential operating system services to the mainframe users. Read More...
  • Mainframe Software
  • [2013-08-10 ]
    The Enterprises working with mainframe systems should have a comprehensive list of the mainframe software available in the market to meet specific needs. Read More...
  • FTP to Mainframe
  • [2013-08-10 ]
    FTP or File Transfer Protocol, is a standard architecture to transfer files in a TCP-based network on various platforms including z/OS, Unix, AS/400 and Windows. Read More...
  • Z/OS SFTP
  • [2013-08-10 ]
    The core of z/OS, also referred as Multiple Virtual Storage (MVS) basically operates in two environments. Read More...
  • 10 Tips on Preparing to Replace a Policy Administration System
  • [2013-08-10 ]
    Many insurers launched new Policy Administration Systems (PAS) in the late 90’s, and the industry noise level is indicating that it may be time for many to upgrade. Read More...
  • How to Choose Best MSG2EML Converter Tool to Convert MSG to EML File?
  • [2013-07-14 ]
    There are many reasons when user prompts with the need to know how to choose best MSG2EML converter tool for export MSG to EML purpose. The search comes to an end at MSG to EML converter software. Read More...
  • MS Access Corrupt Database Recovery Tool – Ascertain Its Require Amongst Users
  • [2013-06-28 ]
    This segment gives readers a perfect view over various reasons behind the rising demand of MS Access corrupt database recovery tool amongst users and also suggest Access Recovery tool for the solution Read More...
  • Mainframe Security
  • [2013-06-28 ]
    For several decades mainframe is being vastly used in many public and private Organizations to hold business critical data. Read More...
  • MSG To PST Download: Know What Is Beneficial About The Conversion
  • [2013-06-28 ]
    The segment will help you get familiar with creation of MSG files, major reasons that make PST files beneficial over MSG’s, etc for which MSG to PST Converter available with MSG to PST download. Read More...
  • Opt For Reliable MSG2EML Converter for Complete Email Migration
  • [2013-06-28 ]
    The article overviews the situations that compel users to call for MSG2EML converter applications. Also, this section highlights the right way of converting emails from MSG file format to EML. Read More...
  • Securing Mainframe FTP
  • [2013-06-14 ]
    File Transfer Protocol (FTP), built on client-server architecture, is a standard method for transferring files between hosts over a TCP-based network on different platforms as Unix, Z/OS, AS/400. Read More...
     
     
      Submit Articles - Free Articles - Online Articles Submission  
      WebZine Articles (webzinearticles.com) is a registered trademark. All Rights Reserved. 2012