1
Monitoring outsourced IT services : a case in email service outsourcing | |
Author | Aye Sandy Myint |
Call Number | AIT RSPR no.ICT-10-08 |
Subject(s) | Electronic mail systems Contracting out |
Note | Submitted in partial fulfillment of the requirements for the degree of Master of Engineering in Information & Communications Technologies, School of Engineering and Technology |
Publisher | Asian Institute of Technology |
Series Statement | Research studies project report ; no. ICT-10-08 |
Abstract | Within a span of over a decade, outsourcing has become one of the most popular paradigms among businesses and industries to adapt with changing market conditions and intense competitions. By adopting externalization, the companies can pay more attention on their core functions and reduce the extra costs, but they have solely to depend on the service providers. Another important issue is about sharing information to ensure that data and vital information of an outsourcing company is secured and protected. So, security and privacy are the two major issues to be considered when a business service or function is to be outsourced. This research study concerns mainly with enforcement and monitoring of outsourced IT services. Outsourced Email services monitoring against unauthorized access has therefore been chosen as a case study of this research because email has become the most powerful and widely used communication facility for all institutions and individuals in today. As the tremendous growth of email usage in online transact ions, securing email has always been an important issue. The threats to email security can be categorized as either eavesdrop or masquerade. Each kind of attack is possible only when the login information and identification are available to the attacker, which means the attacker must have access to a particular email account. Thus, unauthorized accesses to an email account have become the basic point of any kind of attacks. The security is sues of the email service provider’s operations will be monitored by a third party. In order to do so, the third party must have the privilege to access the usage history log generated by the email server. In this research, a log file based method for monitoring unauthorized accesses to email accounts is proposed. An email monitoring system is also designed and implemented based on the proposed method. And finally the applicability and feasibility of the system is also verified |
Year | 2010 |
Corresponding Series Added Entry | Asian Institute of Technology. Research studies project report ; no. ICT-10-08 |
Type | Research Study Project Report (RSPR) |
School | School of Engineering and Technology (SET) |
Department | Department of Information and Communications Technologies (DICT) |
Academic Program/FoS | Information and Communication Technology (ICT) |
Chairperson(s) | Phan Minh Dung; |
Examination Committee(s) | Rajatheva, R. M. A. P.;Guha, Sumanta; |
Scholarship Donor(s) | Asian Institute of Technology Fellowship; |
Degree | Research Studies Project Report (M. Eng.) - Asian Institute of Technology, 2010 |