Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia

The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. The concern applies to both business and academic computer network environments. This paper describes our research about ranking possible network secur...

Full description

Saved in:
Bibliographic Details
Main Authors: Shaari, Muhammad Shakirin, Puteh, Nurnasran, Hassan, Suhaidi
Format: Monograph
Language:English
Published: Universiti Utara Malaysia 1996
Subjects:
Online Access:http://repo.uum.edu.my/4964/1/MUHAMMAD_SHAKIRIN_SHAARI_-_Ranking_Network_Security_Threats_Of_Academic_Administrative_Local_.._%281996%29.pdf
http://repo.uum.edu.my/4964/
http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000167289
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.4964
record_format eprints
spelling my.uum.repo.49642014-02-20T06:27:47Z http://repo.uum.edu.my/4964/ Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia Shaari, Muhammad Shakirin Puteh, Nurnasran Hassan, Suhaidi QA75 Electronic computers. Computer science The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. The concern applies to both business and academic computer network environments. This paper describes our research about ranking possible network security threats in academic administrative local area network. In the research, the Delphi method which involve formation of a team of experts, is adopted to obtain the ranking order of the possible security threats. The network security threats are ranked in terms of severity and probability of happening. The response from the Delphi team is then sorted using two methods, namely the Comparison Risk Ranking and Simple Summation Method. The ranking of threats will then be used for further investigation regarding those network security threats. Universiti Utara Malaysia 1996-04 Monograph NonPeerReviewed application/pdf en http://repo.uum.edu.my/4964/1/MUHAMMAD_SHAKIRIN_SHAARI_-_Ranking_Network_Security_Threats_Of_Academic_Administrative_Local_.._%281996%29.pdf Shaari, Muhammad Shakirin and Puteh, Nurnasran and Hassan, Suhaidi (1996) Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia. Project Report. Universiti Utara Malaysia, Sintok. (Unpublished) http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000167289
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Shaari, Muhammad Shakirin
Puteh, Nurnasran
Hassan, Suhaidi
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
description The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. The concern applies to both business and academic computer network environments. This paper describes our research about ranking possible network security threats in academic administrative local area network. In the research, the Delphi method which involve formation of a team of experts, is adopted to obtain the ranking order of the possible security threats. The network security threats are ranked in terms of severity and probability of happening. The response from the Delphi team is then sorted using two methods, namely the Comparison Risk Ranking and Simple Summation Method. The ranking of threats will then be used for further investigation regarding those network security threats.
format Monograph
author Shaari, Muhammad Shakirin
Puteh, Nurnasran
Hassan, Suhaidi
author_facet Shaari, Muhammad Shakirin
Puteh, Nurnasran
Hassan, Suhaidi
author_sort Shaari, Muhammad Shakirin
title Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
title_short Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
title_full Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
title_fullStr Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
title_full_unstemmed Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
title_sort ranking network security threats of academic administrative local area networks at the institution of higher learning in malaysia
publisher Universiti Utara Malaysia
publishDate 1996
url http://repo.uum.edu.my/4964/1/MUHAMMAD_SHAKIRIN_SHAARI_-_Ranking_Network_Security_Threats_Of_Academic_Administrative_Local_.._%281996%29.pdf
http://repo.uum.edu.my/4964/
http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000167289
_version_ 1644278884403773440
score 13.160551