1 AIT Asian Institute of Technology

An IT security policy framework

AuthorVo Khac Thanh
Call NumberAIT Thesis no.CS-05-23
Subject(s)Computer networks--Security measures
Information technology--Planning

NoteA thesis submitted in paitial fulfillment of the requirements for the degree of Master of Science, School of Advanced Technologies
PublisherAsian Institute of Technology
Series StatementThesis ; no. CS-05-23
AbstractNowadays, with the exploit of information, the quickly developed of electronic it make the computer more and more power and small comfortable users, the technical transmission more high bandwidth such as 100 Mega - 1Giga bit per second in Local Area Network or lager 100 Mbps for WAN, but slow with price. Computers have been popular in the world; it is becoming essentials for working day. Every thing can be done such business, market, shopping ... even education from computer by the spread wildly of Internet. More and more users are using Internet and parallel with the increase technique. the technical person, operator or administrator of sites or networks must face with the security problem, they always have to deal with the problem how can they protect their user. network resources form the hacker. A lot of the venders also issue the security products support or patch for this, but with the spread of Internet more and more hacker was born. with high skill, and sophistical technique. They are easy to get a lot of available tools in the network also spread it for the other once. So the security become the most consider thing for the operators or administrators of the computer network. The Internet was first designed with functionality, not security, it has been very successful in reach it's goal. It offers participants fast, simple and cheap communication mechanisms at the network level that provide "best effort" service to a variety to protocol. In this thesis, overview of the vulnerability of Internet protocol (TCP/IP) and the vulnerability in implementation of it is presented. Varies kind of attack are shown with theirs most popular tool, by analyze it, security method for each type are listed. In common, the "IT Security Policy" is the first thing requires to be done for an Administrator of Network in order to secure the network, it reduces the risk of these attacks, show how to identify attacks, when they happen and different method to respond. Therefore, to support attack defense mechanic, this thesis provides an "IT Security Framework Policy". To answer the question where to start to security a network, what thing should be done for it, is always varies with needs, available of hardware. In my opinion, one of the best ways to prevent from attacking is to think and act likes a hacker. We should try to understand how and why they do that. A small case study of CSIM network - subnet of AlT network. has been done to demonstrate the theory and applications about network security
Year2005
Corresponding Series Added EntryAsian Institute of Technology. Thesis ; no. CS-05-23
TypeThesis
SchoolSchool of Advanced Technologies (SAT)
DepartmentDepartment of Information and Communications Technologies (DICT)
Academic Program/FoSComputer Science (CS)
Chairperson(s)Phan Minh Dung;
Examination Committee(s)Vatcharaporn Esichaikul;Guha, Sumanta;
Scholarship Donor(s)Ho Chi Minh Post and Telecommunication Ho Chi Minh City, Vietnam;
DegreeThesis (M.Sc.) - Asian Institute of Technology, 2005


Usage Metrics
View Detail0
Read PDF0
Download PDF0