DSpace Repository

An IT security policy framework

Show simple item record

dc.contributor.author Vo Khac Thanh en_US
dc.date.accessioned 2015-01-12T10:40:18Z
dc.date.available 2015-01-12T10:40:18Z
dc.identifier.other AIT Thesis no.CS-05-23 en_US
dc.identifier.uri http://www.cs.ait.ac.th/xmlui/handle/123456789/298
dc.description Pathum Thani, Thailand : Asian Institute of Technology, 2005 en_US
dc.description 125 p. : ill. en_US
dc.description.abstract Nowadays, with the exploit of inf o rm ation, th e quickly developed of electronic it m a ke the com puter m o re and m o re power and sm all co m f ortable users, the technical transm ission m o re high bandwidth such as 100 Mega – 1Giga bit per second in Local Area Network or lager 100 Mbps for W AN, but slow with price. Com puters have been popular in the world; it is becom i ng essentials for working day. Ev ery thing can be done such business, m a rket, shopping ... even education from com puter by th e spread wildly of Internet. More and m o re users are using Internet and parallel with the increase technique, the technical person, operator or adm i nistrator of sites or networks m u st face with the security problem , they always have to deal with the problem how can they protect their user, network resources form the hacker. A lot of the venders also i ssue the security products support or patch for this, but with the spread of Internet m o re and m o re hacker was born, with high skill, and sophistical technique. They are easy to get a lot of available tools in the network also spread it for the other once. So the security becom e the m o st consider thing for the operators or adm i nistrators of the com puter network. The Internet was first designed with functiona lity, not security, it has been very successful in reach it’s goal. It offers participants fa st, sim p le and cheap com m unication m echanism s at the network level that provide “best effort” service to a variety to protocol. In this thesis, overview of the vulnerability of Internet protocol (TCP/IP) and the vulnerability in im plem entation of it is presen ted. Varies kind of attack are shown with theirs m o st popular tool, by analyze it, secu rity m e thod for each type are listed. In com m on, the “IT Security Policy” is the first thing requires to be done for an Adm i nistrator of Network in order to secure the network, it re duces the risk of these attacks, show how to identify attacks, when they happen and differe nt m e thod to respond. Therefore, to support attack defense m echanic, this thesis provides an “IT Security Fram ework Policy”. To answer the question where to start to secu rity a network, what thing should be done for it, is always varies with needs, available of hardware. In m y opinion, one of the best ways to prevent from attacking is to think and act likes a hacker. W e should try to understand how and why they do that. A sm all case study of CSIM network – subne t of AIT network, has been done to dem onstrate the theory and applications about network security.
dc.relation.ispartof Thesis no. CS-05-23 en_US
dc.relation.ispartof Asian Institute of Technology. Thesis no. CS-05-23 en_US
dc.subject Computer networks -- Security measures en_US
dc.subject Information technology -- Planning en_US
dc.title An IT security policy framework en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account