![](/images/graphics-bg.png)
Hybrid model for network information security and risk management system
العناوين الأخرى
نموذج هجين لإدارة أمن و مخاطر المعلومات المترابطة
مقدم أطروحة جامعية
مشرف أطروحة جامعية
أعضاء اللجنة
Salamah, Walid Khalid
al-Atum, Jalal Umar
Furayj, Faris
الجامعة
جامعة الأميرة سمية للتكنولوجيا
الكلية
كلية الملك الحسين لعلوم الحوسبة
القسم الأكاديمي
قسم علم الحاسوب
دولة الجامعة
الأردن
الدرجة العلمية
ماجستير
تاريخ الدرجة العلمية
2011
الملخص الإنجليزي
Most of all organizations in industry sectors, commerce and government are fundamentally dependent on their information security systems.
Information Security becomes a necessity for any kind of companies / organizations, and can also be considered as the main factor of success.
The number of threats on the information systems are increasing rapidly ; therefore there should be tools and methods (such as expert staff, secured plan, support and up-to-date equipment) to reduce the impact of these threats.
The current study will focus on issues related to the definition and implementation of information security practices, polices and solutions by concentrating on the need for an effective information security system.
This work has been done on different phases.
The first phase consists of performing a survey of -current systems policies applied in selected organizations.
The second phase will be focusing on the technical side of information security; such as, technical equipment used to eliminate the threats, and for technical preparations, and the last phase is to develop the case studies.
Princes Samara University for Technology (PSUT) and the Royal Scientific Society (RSS) were chosen as case studies.
In this phase, both technical and managerial issues are covered in order to come up with some recommendations and new ideas such as black box backup system, power source management, securing the wireless network using new approaches, strengthen the server room web security, some storing techniques, and the use of remote access service as an early warning system.
To answer some important questions such as : What makes information security successful in an organization? What are the threats that the organization must deal with? What are the criteria of a beneficial information security policy? Are policies in place or not? The answers for these questions led us to effective approaches and strategies that might help organizations achieve a solid information security system in terms of both technical and managerial issues, and are considered as the main objective of this thesis.
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
الموضوعات
عدد الصفحات
142
قائمة المحتويات
Table of contents.
Abstract.
Chapter One : introduction.
Chapter Two : research methodology and thesis overview.
Chapter Three : risk management plan.
Chapter Four : information security technology and networked information system security.
Chapter Five : contributions.
Chapter Six : implementation stage (case study).
References.
نمط استشهاد جمعية علماء النفس الأمريكية (APA)
al-Dasuqi, Iyad. (2011). Hybrid model for network information security and risk management system. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-307140
نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)
al-Dasuqi, Iyad. Hybrid model for network information security and risk management system. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2011).
https://search.emarefa.net/detail/BIM-307140
نمط استشهاد الجمعية الطبية الأمريكية (AMA)
al-Dasuqi, Iyad. (2011). Hybrid model for network information security and risk management system. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-307140
لغة النص
الإنجليزية
نوع البيانات
رسائل جامعية
رقم السجل
BIM-307140
قاعدة معامل التأثير والاستشهادات المرجعية العربي "ارسيف Arcif"
أضخم قاعدة بيانات عربية للاستشهادات المرجعية للمجلات العلمية المحكمة الصادرة في العالم العربي
![](/images/ebook-kashef.png)
تقوم هذه الخدمة بالتحقق من التشابه أو الانتحال في الأبحاث والمقالات العلمية والأطروحات الجامعية والكتب والأبحاث باللغة العربية، وتحديد درجة التشابه أو أصالة الأعمال البحثية وحماية ملكيتها الفكرية. تعرف اكثر
![](/images/kashef-image.png)