Woolard, C. C.
No description available.
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vulnerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and resources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research demonstrates building a secure server architecture protected by a security policy. To achieve this a security policy and a checklist was designed and combined with a host based IDPS, a NMS and a WAF.
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2009. / Title from PDF title page (viewed on Jul. 14, 2010). Includes bibliographical references.
Kylmäaho, Lasse-Pekka, Kristjansson, Haraldur
Network management systems (NMS) monitor, configure and maintain computer networks. Network operators providing networking services are responding to the evolving bandwidth, availability, and latency requirements by upgrading from legacy management systems to alternatives utilizing modern technologies. This paper addresses the trends and challenges of transitioning from legacy NMS to modern management systems. The academic research on network management systems is limited, and we aim to provide a knowledge base on the subject matter by conducting a literature review. The literature review consisted of 43 primary studies from which eight themes were identified by conducting thematic analysis. An NMS’s typical upgrade and selection process is largely unsystematic and based on anecdotal requirements. We utilize the discovered trends and challenges as the basis for the network management system selection process. The selection process was developed via the design science research methodology. The proposed selection process combines the business problems perceived by network service providers with state-of-the-art network research. The results of the review and the process development outline practical implications in the subject area of NMS and introduce potential future research areas in the field of network management.
The purpose of this diploma thesis is to provide a complex overview for the network status visualization topic. The diploma thesis is structured into four parts. The first one is dedicated to the definition of the most important terms, together with the description of several visualization methods, network metrics and last but not least to the discussion of visualization risks and benefits. In the second part, an own visualization process is at first proposed and then the particular steps of this process are discussed. Easy to understand examples are applied through this part. In the third part, several method of data collection protocols and visualization tools are briefly described. The analyzed tools are graphic libraries, as well as standalone applications and Network Management Systems. The last part is dedicated to the analysis of the current visualization tools used on the VŠE network. A short analysis of the university's network is also made. According to this analysis, an own solution is proposed for a particular part of network.
Page generated in 0.1142 seconds