Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
Today, computer networks attacks have continued to increase in severity and sophistication. Data lost and unavailability of network resources due to attacks from internet have negative financial impact on many companies. Unprotected organisation’s networks from internet attacks face high risk of da...
| Main Author: | Eric, Karerangabo |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/1924/1/Karerangabo_Eric.pdf https://etd.uum.edu.my/1924/2/1.Karerangabo_Eric.pdf |
Similar Items
Network security architecture design for Malaysian maritime enforcement agency
by: Abdul Hamid, Mahathir
Published: (2007)
by: Abdul Hamid, Mahathir
Published: (2007)
Visualise name server monitoring
by: Emrani, Seyed Bahador
Published: (2013)
by: Emrani, Seyed Bahador
Published: (2013)
Information security awareness model in social networking for teenagers
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015)
Investment and Economic Growth in Rwanda
by: Elie, Ngabonziza
Published: (2010)
by: Elie, Ngabonziza
Published: (2010)
Application Of VR Technology For Historical Architecture At Pattani, Thailand
by: Ekkapak, Mechai
Published: (2002)
by: Ekkapak, Mechai
Published: (2002)
Study Room Online Reservation in UUM Library
by: Salah, Razwan Mohmed
Published: (2009)
by: Salah, Razwan Mohmed
Published: (2009)
Performance analysis of simultaneous queries to a database in client-server environment
by: Tandjung, Ichwan Ridwan
Published: (1997)
by: Tandjung, Ichwan Ridwan
Published: (1997)
iPhone App: Lecturer's Room Finder, UUM-CAS
by: Khunsri, Chulawadee
Published: (2011)
by: Khunsri, Chulawadee
Published: (2011)
Value focused assessment of information system security
by: Asadi, Saman
Published: (2014)
by: Asadi, Saman
Published: (2014)
Establishing Effective Workflow Interoperability Framework In The Case Of Domino Workflow And Microsoft Exchange 2000 Server
by: Juliana, Wahid
Published: (2002)
by: Juliana, Wahid
Published: (2002)
Testing and bug fixing of the information security management system
by: Vahdani, Omid
Published: (2012)
by: Vahdani, Omid
Published: (2012)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Online Booking System for Meeting and Seminar Rooms College of Arts and Sciences, UUM
by: Alshawawreh, Amro Marei
Published: (2010)
by: Alshawawreh, Amro Marei
Published: (2010)
Information security risk management awareness in e-government outsourced projects
by: Zalehah Muyet
Published: (2011)
by: Zalehah Muyet
Published: (2011)
Readiness of local authorities in implementing information security management system (ISMS)
by: Mohd. Esa, Farah Saffarizan
Published: (2014)
by: Mohd. Esa, Farah Saffarizan
Published: (2014)
Develop an Online Booking System for Graduate Studies at King Faisal University Meeting and Seminar Rooms
by: Mohammed, Fakhrani Hesham
Published: (2011)
by: Mohammed, Fakhrani Hesham
Published: (2011)
Scheduling Examination Faculty Information Technology in UUM
by: Alsmadi, Hamzeh Mohammad Hussein
Published: (2008)
by: Alsmadi, Hamzeh Mohammad Hussein
Published: (2008)
Information security vulnerability in an Iranian context from human perspective(electrical industry)
by: Pouransafar, Malahat
Published: (2013)
by: Pouransafar, Malahat
Published: (2013)
An information security awareness model for financial management infiormation system (FMIS) in Sudan
by: Mahmoud, Suliman Mohamed
Published: (2014)
by: Mahmoud, Suliman Mohamed
Published: (2014)
Systematic secure design guideline to improve integrity and availability of system security
by: Krishnan, Ashvini Devi
Published: (2013)
by: Krishnan, Ashvini Devi
Published: (2013)
A secure method to detect wormhole attack in mobile adhoc network
by: Ardestani, Parichehr Manouchehri
Published: (2013)
by: Ardestani, Parichehr Manouchehri
Published: (2013)
Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeria
by: Gadzama, Wadzani Aduwamai
Published: (2014)
by: Gadzama, Wadzani Aduwamai
Published: (2014)
Exploring Health Information Using WAP Technology: Maternity and Children Guide
by: Abdul Jabar, Russul DH.
Published: (2012)
by: Abdul Jabar, Russul DH.
Published: (2012)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment
by: Hau, Lian Hong
Published: (2013)
by: Hau, Lian Hong
Published: (2013)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Implementing Security in a Client/Server Wireless Local Area Network
by: Chong, Yin Peng
Published: (2004)
by: Chong, Yin Peng
Published: (2004)
Testing information security management system tool v2.1.1.0 based on ISO 27001:2005
by: Shehu, Abdulrahman Mustafa
Published: (2012)
by: Shehu, Abdulrahman Mustafa
Published: (2012)
Distributed Client/Server Architecture With Dynamic Middle Tier
by: Choong, Khong Neng
Published: (1999)
by: Choong, Khong Neng
Published: (1999)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
Evaluation of system requirements specfication compliance to corporate information security policy: case study of risk and incident reporting system (RIRS)
by: Siti Sabariah Yaakob
Published: (2008)
by: Siti Sabariah Yaakob
Published: (2008)
Feasibility study of incorporating remote healthcare system using wireless body area network from the security perspective
by: Vadivelu, Tamil Chelvi
Published: (2013)
by: Vadivelu, Tamil Chelvi
Published: (2013)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
Secure virtual lab design and performance testing for the UTM AIS students
by: Abedula, Dhari Kh
Published: (2013)
by: Abedula, Dhari Kh
Published: (2013)
Design of new block and stream cipher encryption algorithms for data security
by: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Published: (2000)
by: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Published: (2000)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Web Based PhD Thesis Management Information System for Tripoli Faculty of Computer Technology in Libya.(WBPTMS)
by: Sayeh, Salaheddin. S. Mohamed
Published: (2011)
by: Sayeh, Salaheddin. S. Mohamed
Published: (2011)
Feasibility of social networking media in project communications management based on task-technology fit
by: Saw, Jui Hau
Published: (2012)
by: Saw, Jui Hau
Published: (2012)
A Data Warehouse Architecture Model for Al-Quds Open University
by: Taha, Ashraf M.
Published: (2006)
by: Taha, Ashraf M.
Published: (2006)
Similar Items
-
Network security architecture design for Malaysian maritime enforcement agency
by: Abdul Hamid, Mahathir
Published: (2007) -
Visualise name server monitoring
by: Emrani, Seyed Bahador
Published: (2013) -
Information security awareness model in social networking for teenagers
by: Mohamed Khazin, Mohamed Zul Hazmi
Published: (2015) -
Investment and Economic Growth in Rwanda
by: Elie, Ngabonziza
Published: (2010) -
Application Of VR Technology For Historical Architecture At Pattani, Thailand
by: Ekkapak, Mechai
Published: (2002)