Downloads: 113 | Views: 336
Research Paper | Computer Science & Engineering | Saudi Arabia | Volume 5 Issue 2, February 2016 | Popularity: 6.2 / 10
The Network Security Policies of Telecommunication Industries in Sudan
Mohammed Ibrahim M. Gali, Dr. Abdelrahman Elsharif Karrar
Abstract: As networks grow and evolve, the risk of coming under attack increases. To help counter this threat, Cisco has developed the Cisco Self-Defending Network (SDN) strategy. To effectively implement this strategy an organization can leverage their comprehensive security policies. To implement an effective security policy, you must understand why a network security policy is required, common attack-mitigation techniques, the parameters of a secure network life cycle model, and in the end, how to develop a comprehensive security policy. Security Policy. In the past, most closed off from public access, todays networks are more often than not open, and they are now vulnerable to attacks from both the inside and the outside. In addition, as time has passed, hacker tools have become easily available, and the technical knowledge required to use such tools has decreased. This scenario creates quite a challenge for the e-business. A balance must be maintained between the need to open up a network to support the evolution of the business versus the need to protect business information. A network security policy is necessary for a number of reasons, including new laws that require certain levels of protection, an increase in terrorist activity, and the increased risk of being hacked.
Keywords: Computer Networks, Security Policy, Telecommunication, Security Risk Control
Edition: Volume 5 Issue 2, February 2016
Pages: 1972 - 1974
DOI: https://www.doi.org/10.21275/NOV161679
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 695 - 698A Complete Guide to 5G
Saad Shah, Mukesh Patel
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1058 - 1062Comprehensive Research on Cyber - Attacks and Cyber Security
Sonam Khatri
Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024
Pages: 285 - 288Anomaly Detection of Financial Data using Machine Learning
Khirod Chandra Panda
Downloads: 97
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1112 - 1116Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1398 - 1403Integrating Multiple Smart Directional Antennas for Full Potential Exploitation of Broadcasting System
R. Kalaiprasath, R. Elankavi, R. Udayakumar