• Login
    • Login
    Advanced Search
    View Item 
    •   UoN Digital Repository Home
    • Research Papers
    • Faculty of Arts & Social Sciences (FoA&SS / FoL / FBM)
    • School of Business
    • View Item
    •   UoN Digital Repository Home
    • Research Papers
    • Faculty of Arts & Social Sciences (FoA&SS / FoL / FBM)
    • School of Business
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Securing the corporate network

    View/Open
    (Main Article) (73.51Kb)
    Date
    2012
    Author
    WAIGANJO, PETER
    KAMAU, CYRUS
    Type
    Other
    Language
    en
    Metadata
    Show full item record

    Abstract
    Most security issues focus on the connection of the corporate network to the Internet and related issues. Securing corporate networks from intrusion threats in the business today are real and require special attention. The fundamental problem with corporates today is its ability to cope with the rising amount of network intrusions. Network security is fast becoming an absolute necessity to protect the information contained on computer systems worldwide. With 40 per cent of the global economy driven by e-business, attacks on networks are becoming more frequent, more varied, and more costly. The ever changing network use and operation along with the public concern for protection of sensitive information makes implementing an effective security plan a must. The need for increased protection of information assets in storage, in transit, and during access has driven companies to look to vendors to provide products that ensure that their privacy is protected. From the perspective of corporate security, the art is to buy and deploy sufficient security to mitigate the potential risks to the business; this includes many different pieces of software and hardware working together to provide the desired protection. The paper provides details on implementing intrusion detection and monitoring system which mitigates the potential risks to the business, i.e. secure the areas at greatest risk first of all before gradually working back to other less critical areas of risk within the business. This also involves analyzing systems for vulnerabilities and characterizing their nature and potential impact and attempt to identify, prioritize, and plan appropriate mitigation for the risks facing your computing assets. The issue for discussion here is monitoring and reporting network and security intrusion threats of the corporate enterprise.
    URI
    http://hdl.handle.net/11295/10109
    Publisher
    School of Business, University of Nairobi
    Subject
    Network
    Security
    Corporate
    Risk
    Intrusion
    Monitoring
    Reporting
    Description
    Securing the corporate network
    Collections
    • School of Business [175]

    Copyright © 2022 
    University of Nairobi Library
    Contact Us | Send Feedback

     

     

    Useful Links
    UON HomeLibrary HomeKLISC

    Browse

    All of UoN Digital RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2022 
    University of Nairobi Library
    Contact Us | Send Feedback