Show simple item record

dc.contributor.authorWAIGANJO, PETER
dc.contributor.authorKAMAU, CYRUS
dc.date.accessioned2013-02-18T11:33:15Z
dc.date.issued2012
dc.identifier.urihttp://hdl.handle.net/11295/10109
dc.descriptionSecuring the corporate networken
dc.description.abstractMost security issues focus on the connection of the corporate network to the Internet and related issues. Securing corporate networks from intrusion threats in the business today are real and require special attention. The fundamental problem with corporates today is its ability to cope with the rising amount of network intrusions. Network security is fast becoming an absolute necessity to protect the information contained on computer systems worldwide. With 40 per cent of the global economy driven by e-business, attacks on networks are becoming more frequent, more varied, and more costly. The ever changing network use and operation along with the public concern for protection of sensitive information makes implementing an effective security plan a must. The need for increased protection of information assets in storage, in transit, and during access has driven companies to look to vendors to provide products that ensure that their privacy is protected. From the perspective of corporate security, the art is to buy and deploy sufficient security to mitigate the potential risks to the business; this includes many different pieces of software and hardware working together to provide the desired protection. The paper provides details on implementing intrusion detection and monitoring system which mitigates the potential risks to the business, i.e. secure the areas at greatest risk first of all before gradually working back to other less critical areas of risk within the business. This also involves analyzing systems for vulnerabilities and characterizing their nature and potential impact and attempt to identify, prioritize, and plan appropriate mitigation for the risks facing your computing assets. The issue for discussion here is monitoring and reporting network and security intrusion threats of the corporate enterprise.en
dc.language.isoenen
dc.subjectNetworken
dc.subjectSecurityen
dc.subjectCorporateen
dc.subjectRisken
dc.subjectIntrusionen
dc.subjectMonitoringen
dc.subjectReportingen
dc.titleSecuring the corporate networken
dc.title.alternativeImplementing an intrusion monitoring and reporting systemen
dc.typeOtheren
local.embargo.terms6 monthsen
local.embargo.lift2013-08-17T11:33:15Z
local.publisherSchool of Business, University of Nairobien


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record