Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia
The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. The concern applies to both business and academic computer network environments. This paper describes our research about ranking possible network secur...
Saved in:
Main Authors: | , , |
---|---|
Format: | Monograph |
Language: | English |
Published: |
Universiti Utara Malaysia
1996
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/4964/1/MUHAMMAD_SHAKIRIN_SHAARI_-_Ranking_Network_Security_Threats_Of_Academic_Administrative_Local_.._%281996%29.pdf http://repo.uum.edu.my/4964/ http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000167289 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uum.repo.4964 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.49642014-02-20T06:27:47Z http://repo.uum.edu.my/4964/ Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia Shaari, Muhammad Shakirin Puteh, Nurnasran Hassan, Suhaidi QA75 Electronic computers. Computer science The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. The concern applies to both business and academic computer network environments. This paper describes our research about ranking possible network security threats in academic administrative local area network. In the research, the Delphi method which involve formation of a team of experts, is adopted to obtain the ranking order of the possible security threats. The network security threats are ranked in terms of severity and probability of happening. The response from the Delphi team is then sorted using two methods, namely the Comparison Risk Ranking and Simple Summation Method. The ranking of threats will then be used for further investigation regarding those network security threats. Universiti Utara Malaysia 1996-04 Monograph NonPeerReviewed application/pdf en http://repo.uum.edu.my/4964/1/MUHAMMAD_SHAKIRIN_SHAARI_-_Ranking_Network_Security_Threats_Of_Academic_Administrative_Local_.._%281996%29.pdf Shaari, Muhammad Shakirin and Puteh, Nurnasran and Hassan, Suhaidi (1996) Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia. Project Report. Universiti Utara Malaysia, Sintok. (Unpublished) http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000167289 |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Shaari, Muhammad Shakirin Puteh, Nurnasran Hassan, Suhaidi Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia |
description |
The advancement and proliferation of computer networks nowadays have prompted for a concern on the issue of security of the whole network operation. The concern applies to both business and academic computer network environments. This paper describes our research about ranking possible network security threats in academic administrative local area network. In the research, the Delphi method which involve formation of a team of experts, is adopted to obtain the ranking order of the possible security threats. The network security threats are ranked in terms of severity and probability of happening. The response from the Delphi team is then sorted using two methods, namely the Comparison Risk Ranking and Simple Summation Method. The ranking of threats will then be used for further investigation regarding those network security threats. |
format |
Monograph |
author |
Shaari, Muhammad Shakirin Puteh, Nurnasran Hassan, Suhaidi |
author_facet |
Shaari, Muhammad Shakirin Puteh, Nurnasran Hassan, Suhaidi |
author_sort |
Shaari, Muhammad Shakirin |
title |
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia |
title_short |
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia |
title_full |
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia |
title_fullStr |
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia |
title_full_unstemmed |
Ranking network security threats of academic administrative local area networks at the institution of higher learning in Malaysia |
title_sort |
ranking network security threats of academic administrative local area networks at the institution of higher learning in malaysia |
publisher |
Universiti Utara Malaysia |
publishDate |
1996 |
url |
http://repo.uum.edu.my/4964/1/MUHAMMAD_SHAKIRIN_SHAARI_-_Ranking_Network_Security_Threats_Of_Academic_Administrative_Local_.._%281996%29.pdf http://repo.uum.edu.my/4964/ http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000167289 |
_version_ |
1644278884403773440 |
score |
13.160551 |