ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Information and Computer Network Security Policy for Sudanese Telecom Companies

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 3)

Publication Date:

Authors : ; ; ;

Page : 2100-2104

Keywords : Information Security; Security Policy; Scrutiny Management;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

As networks grow and evolve, the risk of coming under attack increases Network security polices represent a very important task for telecommunication companies. This policy will prevent any threat or intervention to companies networks. This research tries to provide a recommendation for implementing a network security policy for Sudan Telecommunication Company To achieve research goals the author explores different security policies that is implemented in a different environment and summarize the strength and weakness of each. This research consists of five chapters, chapter one is an introductory chapter, covers problem overview, objectives, research question, methodology, and work scope. Chapter two Literature Review covers different issues regarding this research. Chapter Three covers history of telecommunication in Sudan, security challenges to the Telecom networks, comparison of network security polices between international telecommunication and Sudanese telecommunication companies, and network security improvement. Chapter Four detailed Design and Implementation, it went through computer and network policy, and change management. The research concluded (chapter five Conclusion), by implementing a track system for any security threat and provided a new security policy that can work as a guideline for any telecommunication company.

Last modified: 2021-06-30 18:07:59