Information and Computer Network Security Policy for Sudanese Telecom Companies
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 3)Publication Date: 2017-03-05
Authors : Mohamed Ibrahim Gali; Mudawi Al Musharaf; Abdelrahman Elsharif Karrar;
Page : 2100-2104
Keywords : Information Security; Security Policy; Scrutiny Management;
Abstract
As networks grow and evolve, the risk of coming under attack increases Network security polices represent a very important task for telecommunication companies. This policy will prevent any threat or intervention to companies networks. This research tries to provide a recommendation for implementing a network security policy for Sudan Telecommunication Company To achieve research goals the author explores different security policies that is implemented in a different environment and summarize the strength and weakness of each. This research consists of five chapters, chapter one is an introductory chapter, covers problem overview, objectives, research question, methodology, and work scope. Chapter two Literature Review covers different issues regarding this research. Chapter Three covers history of telecommunication in Sudan, security challenges to the Telecom networks, comparison of network security polices between international telecommunication and Sudanese telecommunication companies, and network security improvement. Chapter Four detailed Design and Implementation, it went through computer and network policy, and change management. The research concluded (chapter five Conclusion), by implementing a track system for any security threat and provided a new security policy that can work as a guideline for any telecommunication company.
Other Latest Articles
- To Compare the Effectiveness of Muscle Energy Technique versus Myofasial Release in Pain and Lower Limb Functional Activity in Subjects Having Planter Fasciitis - A Randomized Control Trial
- Data Balancing Scheme for Multi-node Heterogeneous Hadoop Cluster
- Elastic Electron Scattering from Some Proton-Rich Exotic Nuclei
- On Shrinkage Estimation of the Stress ? Strength Reliability of Exponentiaed Weibull Distribution
- Plant Species Identification using SIFT and SURF Technique
Last modified: 2021-06-30 18:07:59