We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:Network Usage Security Policies for Academic Institutions

by S.M.Aqil Burney, M.Sadiq Ali Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 14
Year of Publication: 2010
Authors: S.M.Aqil Burney, M.Sadiq Ali Khan
10.5120/1332-1771

S.M.Aqil Burney, M.Sadiq Ali Khan . Article:Network Usage Security Policies for Academic Institutions. International Journal of Computer Applications. 7, 14 ( October 2010), 6-11. DOI=10.5120/1332-1771

@article{ 10.5120/1332-1771,
author = { S.M.Aqil Burney, M.Sadiq Ali Khan },
title = { Article:Network Usage Security Policies for Academic Institutions },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 14 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number14/1332-1771/ },
doi = { 10.5120/1332-1771 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:16.133580+05:30
%A S.M.Aqil Burney
%A M.Sadiq Ali Khan
%T Article:Network Usage Security Policies for Academic Institutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 14
%P 6-11
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In any universities operation its managerial administration play an important characteristics. Universities have their Management Based System (MBS) but most of them are vulnerable to malicious activities such as virus attacks, spoofing attacks, and unauthorized access from outside network. We have to build a stable system of administration which guarantees us the operation of all academic affairs and monitor the real time traffic and detect possible attacks generated by hackers which basically want to destroy the important resources and information contents of the university. We also proposed a security policy especially for the universities networks. Furthest most, we can constitute an apt and accomplished system to secure the educational administration and bestow useful suggestions for university’s educational administration information security. The rapid increase of information technology usage demands the high level of security in order to protect the data assets and equipments of the user. This paper will give guidelines that allow the universities to manage network security effectively.

References
  1. JA Gutiérrez, Donald P Sheridan and R. Radhakrishna Pillai. 2000; “A Framework and Lightweight Protocol for Multimedia Network Management”; Journal of Network and Systems; Springer.
  2. Peter Folger. 2009; “Geospatial Information and Geographic Information Systems (GIS): Current Issues and Future Challenges”; CRS Report for Congress.
  3. Syed Muhammad Aqil Burney and M. Sadiq Ali Khan. 2010; “Feature Deduction and Ensemble Design of Parallel Neural Networks for Intrusion Detection System”; IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010
  4. Ki-Yoon Kim and Ken Surendran. 2003; “Information Security Management Curriculum Design: A Joint Industry and Academic Effort”; Journal of Information Systems Education, Vol. 13(3).
  5. Adrianne Jefrries. 2010; “Debate Around Password Security Overlooks Universal Logins” .
  6. Sandra. Steinbrecher, Groß. Stephan, Meichau. Markus. 2009; “Jason: A Scalable Reputation System for the Semantic Web”; IFIP Advances in Information and Communication Technology, Volume 297, Emerging Challenges for Security, Privacy and Trust, Pages 421-431.
  7. Jeffrey Brian Arnold. 2008; “Ksplice: An automatic system for Rebootless Kernel Security Updates”; MIT.
  8. Parsa Mirhaji, S. Ward Casscells, Arunkumar Srinivasan, Narendra Kunapareddy, Sean Byrne, David Richards, and Raouf Arafat. 2006;” Services Oriented Architectures and Rapid Deployment of Ad-Hoc Health Surveillance Systems”; AMIA Annu Symp Proc. 2006; 2006: 569–573.
  9. Matt Bishop. 2003, “Computer Security: Art and Science”; Reading, MA: Addison Wesley Professional .
  10. Akhter Raza,S.M.Aqil Burney,Major Saleemi. 2010, “ Forecasting Network Traffic Load using Wavelet Filters and Seasonal Autoregressive Moving Average model”, Submitted for publication in International Journal of Computer and Electrical Engineering (IJCEE) will be published in Dec.
  11. Amit P. Jardosh, Krishna N Ramachandran,Kevin C Almeroth and Elizebeth M. Belding Royer. 2005; “Understanding Link-Layer Behavior in Highly Congested IEEE 802.11b Wireless Networks”; SIGCOMM’05 Workshops, Philadelphia, PA, USA. ACM 1-59593-026-4/05/0008.
Index Terms

Computer Science
Information Sciences

Keywords

malicious activities management based system security intrusion detection system risk information contents