tailieunhanh - Network Security: Policies and Guidelines for Effective Network Management

Consider the family of sensor routing protocols where each sensor communicates either directly or indirectly with a base station. In turn the base station correlates and aggregates information from each sensor. Accordingly, the base station will need to verify the authenticity of the sensor, the integrity of the communication and ascertain that it is not a replay of an earlier communication. Recall the assumption that the base station is computationally robust and secure. In our protocol each sensor j shares a unique 64 bit Key Key , with the base station. Our protocol provides for a multi-hop scenario where the range of a base station. | Leonardo Journal of Sciences ISSN 1583-0233 Issue 13 July-December 2008 p. 7-21 Network Security Policies and Guidelines for Effective Network Management Jonathan Gana KOLO Umar Suleiman DAUDA Department of Electrical and Computer Engineering Federal University of Technology Minna Nigeria. jgkolo@ usdauda@ Abstract Network security and management in Information and Communication Technology ICT is the ability to maintain the integrity of a system or network its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking insurance hospital education manufacturing etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also ICT has fast become a primary differentiator for institution organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data particularly financial information and password. This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data. http 7 Network Security Policies and Guidelines for Effective Network Management Jonathan Gana KOLO Umar Suleiman DAUDA Keyword ICT Security Network Management IT Hardware Software Access Risk Control Asset Resources Data Passwords Hacker. Introduction We are living in an information .