International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 113

Research Paper | Computer Science & Engineering | Saudi Arabia | Volume 5 Issue 2, February 2016


The Network Security Policies of Telecommunication Industries in Sudan

Mohammed Ibrahim M. Gali | Dr. Abdelrahman Elsharif Karrar [5]


Abstract: As networks grow and evolve, the risk of coming under attack increases. To help counter this threat, Cisco has developed the Cisco Self-Defending Network (SDN) strategy. To effectively implement this strategy an organization can leverage their comprehensive security policies. To implement an effective security policy, you must understand why a network security policy is required, common attack-mitigation techniques, the parameters of a secure network life cycle model, and in the end, how to develop a comprehensive security policy. Security Policy. In the past, most closed off from public access, todays networks are more often than not open, and they are now vulnerable to attacks from both the inside and the outside. In addition, as time has passed, hacker tools have become easily available, and the technical knowledge required to use such tools has decreased. This scenario creates quite a challenge for the e-business. A balance must be maintained between the need to open up a network to support the evolution of the business versus the need to protect business information. A network security policy is necessary for a number of reasons, including new laws that require certain levels of protection, an increase in terrorist activity, and the increased risk of being hacked.


Keywords: Computer Networks, Security Policy, Telecommunication, Security Risk Control


Edition: Volume 5 Issue 2, February 2016,


Pages: 1972 - 1974

The Network Security Policies of Telecommunication Industries in Sudan


How to Cite this Article?

Mohammed Ibrahim M. Gali, Dr. Abdelrahman Elsharif Karrar, "The Network Security Policies of Telecommunication Industries in Sudan", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV161679, Volume 5 Issue 2, February 2016, 1972 - 1974, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Computer Networks'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1058 - 1062

Comprehensive Research on Cyber - Attacks and Cyber Security

Sonam Khatri

Share this Article

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri | Nitin R. Chopde [2]

Share this Article


Top