Nobody downloaded yet

Network security - Dissertation Example

Comments (0) Cite this document
Summary
Network Security and Its Business Impact in Educational Institutions By Mohammed Abdul Rahman Supervisor: Dr. Kim Heng Teo Master project undertaken in partial fulfillment of the requirements for the M.Sc. in Business Information Technology University of xxxxx June 2011 DISSERTATION DECLARATION FORM University of xxxxx The declaration form is to be completed and attached within the project dissertation…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Network security
Read TextPreview

Extract of sample
"Network security"

Download file to see previous pages The consequences of plagiarism have been explained to me by my institution; and 3. The project is all my own work and I have acknowledged any use of others’ published or unpublished works. 4. The project was completed over the period from January 2011 to June 2011. Student Signature:_______________ Date: __________________ Acknowledgements I would like to thank all the technical staff of Majan College who have helped me throughout the completion of this project with various ideas. Also I would like to thank my friend Mr. Bader who actually was a major support with his connections in the educational institutions of Oman. Special thanks for my friend Mr. Safi Ullah Sharief who has helped me in proof reading of this project. I extend all my thanks to all the network administrators and the supporting staff in the computer department of various colleges in Sultanate of Oman, who despite of their busy schedule help me in providing the information and technical details, without which this project could not have be done by me. I express my gratitude to my family for their patience, understanding care and support which they provided to me during this period. And sincere appreciation goes to Dr. Kim Heng Teo for the advisory support during the formulation of this project Abstract Network security is a crucial issue. For wired network and wireless network, somewhat transformed security measures are required as wireless network requires more strict security as compared to wired network. The educational institutions make use of wired as well as wireless networks for their processes and procedures. Students, staff and other faculty members make use of the network for accessing required data and information. The combination of wired and wireless networks plays an important part in enabling network users to enjoy a network that is more optimized and resourceful. When wired network is combined with wireless network, there are some implications for security on educational institutions. A research is conducted with the help of a questionnaire that is generated to collect the responses of respondents on the issue of security needs for wired and wireless networks. A total of forty one respondents submitted filled in questionnaires. The research is set in colleges in the context of improvising the security of the college network after adding the wireless network (Wireless LAN) with the existing wired network (Local LAN). The problem for the Network administrators is focused on understanding that the security needs to be strengthened when a wireless network is added to the wired network. In addition to the questionnaire, interviews are also conducted with some questions to know the security issues raised after interconnection of the two networks. The research analyzes that the business impacts of combined wireless and wired network security in educational institutions. The benefits associated with the usage of combined network are better speed, enhanced bandwidth, wider communication and better information retrieval. Disadvantages such as theft of passwords and personal financial data are there. The combined network will be more beneficial than disadvantageous for the users of the network. Abbreviation IT Information Technology PC Personal Computer LAN Local Area Network MAC Mandatory Access Control WEP Wired Equivalent Privacy ADSL Asymmetric ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network security Dissertation Example | Topics and Well Written Essays - 12500 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1405455-network-security
(Network Security Dissertation Example | Topics and Well Written Essays - 12500 Words)
https://studentshare.org/family-consumer-science/1405455-network-security.
“Network Security Dissertation Example | Topics and Well Written Essays - 12500 Words”, n.d. https://studentshare.org/family-consumer-science/1405455-network-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cloud Computing and Security Issues
..., organizational culture and technical skills needed by the end users. Moreover, there have been several incidences where cloud technology has found itself defenseless in front of hacking attacks like the one against Gmail and the Sony PlayStation gaming network (Paul, 2011) The reasons for the security vulnerabilities are varied ranging from the inherent vulnerabilities in the core technologies to the network vulnerabilities (Armbrust et al, 2009). As cloud computing is an emerging technology, so are the concerns about security challenges being discovered and addressed. The current dissertation aims to explore the perception of the end users about the security...
51 Pages(12750 words)Dissertation
Network Intrusion Detection and Forensics
...networks would completely compromise our computing experience and the utilization of these indispensable network tools. Network Intrusion Detection Systems (NIDS) are partly the reason behind the continued security in computer systems around the world. The NIDS systems detect illicit use of computer networks, alert network administrators, create reports in the system through their logging abilities, and try to prevent harm to the network by malevolent network users. However, many users of computer networks lack access to decent NIDS systems available commercially. Part of the reason why many...
26 Pages(6500 words)Dissertation
Information Security analysis
...Response Count Security management practices - Security management responsibilities and the core components of security management 6 20 30 29 28 11 2.69 124 Access Control - Identification methods and technologies, biometrics and more 9 24 24 36 23 8 2.52 124 Cryptography - Cryptographic components and their relationships, and government involvement in cryptography. 22 38 26 21 14 3 1.81 124 Security models and architecture - Outlining how security is to be implemented, and the framework and structure of a security system. 11 27 27 32 17 10 2.38 124 Telecommunications and networking - How networks work, how data...
87 Pages(21750 words)Dissertation
Routing Protocols for Ad-hoc Wireless Network
..., on the fly. This network gets developed immediately and it employs multi-hop routing for transferring information. MANET technology offers an extremely flexible procedure for communications under the circumstances as such in which a completely distributed communication network system is required without having any fixed base station due to the geographical or terrestrial constraints, as for instance: the emergency and disaster situations battlefields, and the military applications. Apparently, security is a major concern in these areas. Definitely, in a MANET, some or all of the nodes may obtain energy from exhaustible sources like batteries. Subsequent to the limited battery power and...
20 Pages(5000 words)Dissertation
Firewall and Internet security
...?Firewall and Internet Security – A Research Proposal Research Question The advancements in technology and the growing pace of internet have almost pulled every individual on earth into the virtual world of cyber pace. As every day passes by, the rapidity with which internet grows has increased exponentially and as a result, the world is shrinking smaller and smaller. People living in extremities of the world could easily communicate just like they are doing it when they are in direct contact with each other. The distance is no more a matter of concern. Despite all the advantages of a networked world, the parallel increase in cyber threats has been an alarming factor. Information is the key to success of any individual or organization. When... there...
9 Pages(2250 words)Dissertation
Cloud Computing Security
...that organizations face while using cloud computing. In this scenario, Hamlen, Kantarcioglu and Khan discuss a wide variety of security problems in a cloud computing environment. Additionally, these security issues include data security, physical security, middleware safety, network security and application security. The basic purpose of using cloud computing is to allow another organization (cloud service provider) to effectively store and manage data that cannot be managed by the owner of the data (Hamlen, Kantarcioglu, Khan, and Thuraisingham). Moreover, at present, the use of cloud computing has turned into an attractive...
5 Pages(1250 words)Dissertation
Cyber Network Security, Threats, Risk and Its Prevention
... Cyber Network Security, Threats, Risk, and It’s Prevention Introduction: Technology has a significant role to play in the lives of human beings and every activity associated with. Over the years the development of technology has been rising to the needs of the common people and in the business organizations as well. To this, the role of information technology (IT) is worth mentioning that is greatly depended upon. Although IT may not be the only technological advancement responsible for the improvement in lives and activities, yet it has a significant role to play since changes in lives would not have been possible without the availability of new information (Castells, 1999, p.2). The rapid change in technology has significant effects... in the...
32 Pages(8000 words)Dissertation
Routing Protocol Security OSPFv2
...? Routing Protocol Security OSPFv2 Conclusion and Future Recommendations The current research demonstrated quite clearly that a OSPFV2 Routing protocol can be used as an internet security measure. The study sought to investigate the Open Shortest Path First (OSPF) as a link-state routing protocol often used in the Internet Protocol (IP) networks. Recognizing the OSPF as one of the most widely applicable Interior gateway protocol in most large enterprise network, the current work, delved into investigating the security measures often associated with the application of the use of OSPF v2 Routing protocol. Using MD5 method to make a comparison between the...
3 Pages(750 words)Dissertation
Social network security is seriously threatened
...? WOULD SOCIAL NETWORK INTERCONNECTION THREATEN USER’S PRIVACY? Social media has taken the driving seat in the world of virtual connectivity. It has massive implications for the businesses as well as individuals. Along with the benefits it has offered to the world of technology, the issues pertaining to its misuse have arisen to a similar extent. Most importantly, the defining feature of interconnectivity of social media is being used for the privacy breach with mall intentions (Sophos, 2010; Gallagher, 2009). This has also formed the ground for this dissertation. The dissertation with primary (questionnaire based) and secondary research has developed the review pertaining to the understanding of security and...
16 Pages(4000 words)Dissertation
Network Security and the Demilitarized Zone
4 Pages(1000 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Dissertation on topic Network security for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us