International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 170 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | Saudi Arabia | Volume 6 Issue 3, March 2017


Information and Computer Network Security Policy for Sudanese Telecom Companies

Mohamed Ibrahim Gali | Mudawi Al Musharaf | Abdelrahman Elsharif Karrar [6]


Abstract: As networks grow and evolve, the risk of coming under attack increases Network security polices represent a very important task for telecommunication companies. This policy will prevent any threat or intervention to companies networks. This research tries to provide a recommendation for implementing a network security policy for Sudan Telecommunication Company To achieve research goals the author explores different security policies that is implemented in a different environment and summarize the strength and weakness of each. This research consists of five chapters, chapter one is an introductory chapter, covers problem overview, objectives, research question, methodology, and work scope. Chapter two Literature Review covers different issues regarding this research. Chapter Three covers history of telecommunication in Sudan, security challenges to the Telecom networks, comparison of network security polices between international telecommunication and Sudanese telecommunication companies, and network security improvement. Chapter Four detailed Design and Implementation, it went through computer and network policy, and change management. The research concluded (chapter five Conclusion), by implementing a track system for any security threat and provided a new security policy that can work as a guideline for any telecommunication company.


Keywords: Information Security, Security Policy, Scrutiny Management


Edition: Volume 6 Issue 3, March 2017,


Pages: 2100 - 2104


How to Download this Article?

Type Your Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top