International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | Saudi Arabia | Volume 6 Issue 3, March 2017


Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali | Mudawi Al Musharaf | Abdelrahman Elsharif Karrar [6]


Abstract: As networks grow and evolve, the risk of coming under attack increases Network security polices represent a very important task for telecommunication companies. This policy will prevent any threat or intervention to companies networks. This research tries to provide a recommendation for implementing a network security policy for Sudan Telecommunication Company To achieve research goals the author explores different security policies that is implemented in a different environment and summarize the strength and weakness of each. This research consists of five chapters, chapter one is an introductory chapter, covers problem overview, objectives, research question, methodology, and work scope. Chapter two Literature Review covers different issues regarding this research. Chapter Three covers history of telecommunication in Sudan, security challenges to the Telecom networks, comparison of network security polices between international telecommunication and Sudanese telecommunication companies, and network security improvement. Chapter Four detailed Design and Implementation, it went through computer and network policy, and change management. The research concluded (chapter five Conclusion), by implementing a track system for any security threat and provided a new security policy that can work as a guideline for any telecommunication company.


Keywords: Information Security, Security Policy, Scrutiny Management


Edition: Volume 6 Issue 3, March 2017,


Pages: 2100 - 2104


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Mohamed Ibrahim Gali, Mudawi Al Musharaf, Abdelrahman Elsharif Karrar, "Information and Computer Network Security Policy for Sudanese Telecom Companies", International Journal of Science and Research (IJSR), Volume 6 Issue 3, March 2017, pp. 2100-2104, https://www.ijsr.net/get_abstract.php?paper_id=ART20172125

Similar Articles with Keyword 'Information Security'

Downloads: 110

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah | Nur Faizah Binti Ab Aziz [2] | Maya Novia Sari [2] | Jamaludin Bin Ibrahim [4]

Share this Article

Downloads: 112

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai | Abu Sulemana [2]

Share this Article
Top