1 AIT Asian Institute of Technology

Monitoring outsourced IT services : a case in email service outsourcing

AuthorAye Sandy Myint
Call NumberAIT RSPR no.ICT-10-08
Subject(s)Electronic mail systems
Contracting out

NoteSubmitted in partial fulfillment of the requirements for the degree of Master of Engineering in Information & Communications Technologies, School of Engineering and Technology
PublisherAsian Institute of Technology
Series Statement Research studies project report ; no. ICT-10-08
AbstractWithin a span of over a decade, outsourcing has become one of the most popular paradigms among businesses and industries to adapt with changing market conditions and intense competitions. By adopting externalization, the companies can pay more attention on their core functions and reduce the extra costs, but they have solely to depend on the service providers. Another important issue is about sharing information to ensure that data and vital information of an outsourcing company is secured and protected. So, security and privacy are the two major issues to be considered when a business service or function is to be outsourced. This research study concerns mainly with enforcement and monitoring of outsourced IT services. Outsourced Email services monitoring against unauthorized access has therefore been chosen as a case study of this research because email has become the most powerful and widely used communication facility for all institutions and individuals in today. As the tremendous growth of email usage in online transact ions, securing email has always been an important issue. The threats to email security can be categorized as either eavesdrop or masquerade. Each kind of attack is possible only when the login information and identification are available to the attacker, which means the attacker must have access to a particular email account. Thus, unauthorized accesses to an email account have become the basic point of any kind of attacks. The security is sues of the email service provider’s operations will be monitored by a third party. In order to do so, the third party must have the privilege to access the usage history log generated by the email server. In this research, a log file based method for monitoring unauthorized accesses to email accounts is proposed. An email monitoring system is also designed and implemented based on the proposed method. And finally the applicability and feasibility of the system is also verified
Year2010
Corresponding Series Added Entry Asian Institute of Technology. Research studies project report ; no. ICT-10-08
TypeResearch Study Project Report (RSPR)
SchoolSchool of Engineering and Technology (SET)
DepartmentDepartment of Information and Communications Technologies (DICT)
Academic Program/FoSInformation and Communication Technology (ICT)
Chairperson(s)Phan Minh Dung;
Examination Committee(s)Rajatheva, R. M. A. P.;Guha, Sumanta;
Scholarship Donor(s)Asian Institute of Technology Fellowship;
DegreeResearch Studies Project Report (M. Eng.) - Asian Institute of Technology, 2010


Usage Metrics
View Detail0
Read PDF0
Download PDF0