We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Network security - Dissertation Example

Comments (0)
Network Security and Its Business Impact in Educational Institutions By Mohammed Abdul Rahman Supervisor: Dr. Kim Heng Teo Master project undertaken in partial fulfillment of the requirements for the M.Sc. in Business Information Technology University of xxxxx June 2011 DISSERTATION DECLARATION FORM University of xxxxx The declaration form is to be completed and attached within the project dissertation…
Download full paper
Network security
Read TextPreview

Extract of sample
Network security

Download file to see previous pages... The consequences of plagiarism have been explained to me by my institution; and 3. The project is all my own work and I have acknowledged any use of others’ published or unpublished works. 4. The project was completed over the period from January 2011 to June 2011. Student Signature:_______________ Date: __________________ Acknowledgements I would like to thank all the technical staff of Majan College who have helped me throughout the completion of this project with various ideas. Also I would like to thank my friend Mr. Bader who actually was a major support with his connections in the educational institutions of Oman. Special thanks for my friend Mr. Safi Ullah Sharief who has helped me in proof reading of this project. I extend all my thanks to all the network administrators and the supporting staff in the computer department of various colleges in Sultanate of Oman, who despite of their busy schedule help me in providing the information and technical details, without which this project could not have be done by me. I express my gratitude to my family for their patience, understanding care and support which they provided to me during this period. And sincere appreciation goes to Dr. Kim Heng Teo for the advisory support during the formulation of this project Abstract Network security is a crucial issue. For wired network and wireless network, somewhat transformed security measures are required as wireless network requires more strict security as compared to wired network. The educational institutions make use of wired as well as wireless networks for their processes and procedures. Students, staff and other faculty members make use of the network for accessing required data and information. The combination of wired and wireless networks plays an important part in enabling network users to enjoy a network that is more optimized and resourceful. When wired network is combined with wireless network, there are some implications for security on educational institutions. A research is conducted with the help of a questionnaire that is generated to collect the responses of respondents on the issue of security needs for wired and wireless networks. A total of forty one respondents submitted filled in questionnaires. The research is set in colleges in the context of improvising the security of the college network after adding the wireless network (Wireless LAN) with the existing wired network (Local LAN). The problem for the Network administrators is focused on understanding that the security needs to be strengthened when a wireless network is added to the wired network. In addition to the questionnaire, interviews are also conducted with some questions to know the security issues raised after interconnection of the two networks. The research analyzes that the business impacts of combined wireless and wired network security in educational institutions. The benefits associated with the usage of combined network are better speed, enhanced bandwidth, wider communication and better information retrieval. Disadvantages such as theft of passwords and personal financial data are there. The combined network will be more beneficial than disadvantageous for the users of the network. Abbreviation IT Information Technology PC Personal Computer LAN Local Area Network MAC Mandatory Access Control WEP Wired Equivalent Privacy ADSL Asymmetric ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Cloud Computing and Security Issues
1.1 Research Background Cloud computing is a new and emerging trend in the IT industry that is set to revolutionize the way people approach and use computing. There has been an exponential growth in new technologies that have converged to develop cloud computing services.
51 Pages(12750 words)Dissertation
Network Intrusion Detection and Forensics
This article is a research-based project that aims to compare two or more open source Network Intrusion Detection Systems, in terms of their operation, methods of detection, capabilities, and performance. Network Intrusion Detection Systems (NIDSs), are developed to monitor network activities for any malicious activities and network violations.
26 Pages(6500 words)Dissertation
Information Security analysis
The paper presents the frequency and percentage distribution of the organizations considered in the study and grouped according to nature: public sector or government agency, private sector or business, and nonprofit organization. The paper also presents the frequency and percentage distribution of the organizations included in the study grouped according to the sector each organization represents.
87 Pages(21750 words)Dissertation
Routing Protocols for Ad-hoc Wireless Network
IEEE 802.11b standard is operational on a 2.4 GHz unlicensed frequency spectrum that offers a maximum data rate of 11 Mbps. Likewise, this standard divides the band further to 11 separate channels, as 11 channels are available in north America and 13 channels are in Europe.
20 Pages(5000 words)Dissertation
Firewall and Internet security
People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each other. The distance is no more a matter of concern. Despite all the advantages of a networked world, the parallel increase in cyber threats has been an alarming factor
9 Pages(2250 words)Dissertation
Network Security and the Demilitarized Zone

According to the research findings, it can, therefore, be said that the functionality of DMZ is similar to a proxy server, as the workstations configured in DMZ interact with the public networks. Furthermore, the most significant advantage of a DMZ is that it protects the local area network domains by segregating the network layer.

4 Pages(1000 words)Coursework
Cloud Computing Security
On the other hand, the advancement of cloud computing has also created a wide variety of new challenges to existing techniques and approaches to build up and change software intensive systems (Babar and Chauhan; Meng, Wang, Hu, and Li). In addition, many researchers have discussed different challenges and issues that organizations face while using cloud computing.
5 Pages(1250 words)Dissertation
Cyber Network Security, Threats, Risk and Its Prevention
To this, the role of information technology (IT) is worth mentioning that is greatly depended upon. Although IT may not be the only technological advancement responsible for the improvement in lives and activities, yet it has a significant role to play since changes in lives would not have been possible without the availability of new information (Castells, 1999, p.2).
32 Pages(8000 words)Dissertation
Routing Protocol Security OSPFv2
Recognizing the OSPF as one of the most widely applicable Interior gateway protocol in most large enterprise network, the current work, delved into investigating the security measures often associated with the application of the use of OSPF v2 Routing protocol.
3 Pages(750 words)Dissertation
Social network security is seriously threatened
Most importantly, the defining feature of interconnectivity of social media is being used for the privacy breach with mall intentions (Sophos, 2010; Gallagher, 2009). This has also formed the ground for this dissertation. The dissertation with primary (questionnaire based) and secondary research has developed the review pertaining to the understanding of security and safety of the content by the Social Networking Sites (SNS).
16 Pages(4000 words)Dissertation
Let us find you another Dissertation on topic Network security for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us