Information and Computer Network Security Policy for Sudanese Telecom Companies
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Saudi Arabia | Volume 6 Issue 3, March 2017

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

As networks grow and evolve, the risk of coming under attack increases Network security polices represent a very important task for telecommunication companies. This policy will prevent any threat or intervention to companies networks. This research tries to provide a recommendation for implementing a network security policy for Sudan Telecommunication Company To achieve research goals the author explores different security policies that is implemented in a different environment and summarize the strength and weakness of each. This research consists of five chapters, chapter one is an introductory chapter, covers problem overview, objectives, research question, methodology, and work scope. Chapter two Literature Review covers different issues regarding this research. Chapter Three covers history of telecommunication in Sudan, security challenges to the Telecom networks, comparison of network security polices between international telecommunication and Sudanese telecommunication companies, and network security improvement. Chapter Four detailed Design and Implementation, it went through computer and network policy, and change management. The research concluded (chapter five Conclusion), by implementing a track system for any security threat and provided a new security policy that can work as a guideline for any telecommunication company.

Keywords: Information Security, Security Policy, Scrutiny Management

Edition: Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Share this Article

How to Cite this Article?

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar, "Information and Computer Network Security Policy for Sudanese Telecom Companies", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20172125, Volume 6 Issue 3, March 2017, 2100 - 2104

81 PDF Views | 73 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Information Security'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Similar Articles with Keyword 'Security Policy'

Research Paper, Information Technology, Saudi Arabia, Volume 6 Issue 3, March 2017

Pages: 2100 - 2104

Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar

Share this Article

Informative Article, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 92 - 93

Infosecurity Management

Dr D S Kushwaha, Dr A S Vidyarthi

Share this Article
Top