DSpace Repository

Practical Approaches to Securing an IT Environment

Show simple item record

dc.contributor.author John C, Fuller
dc.contributor.author Cofie, Penrose
dc.contributor.author Warsame H, Ali
dc.contributor.author Emmanuel S., Kolawole
dc.date.accessioned 2018-05-11T12:10:47Z
dc.date.available 2018-05-11T12:10:47Z
dc.date.issued 2017-11
dc.identifier.citation Communication and Network Vol.9 No.4, November 2017 en_US
dc.identifier.uri http://hdl.handle.net/123456789/1317
dc.description.abstract There are a number of IT Security journals available in the literature but none of these research papers have practically specified approaches to secure the IT environment at large. In this paper, more emphases will be laid on the practical ways to secure our IT environments and with some useful real-life scenarios. In today, securing our IT environment has become the key factor in the industry due to an increasing number of attackers invading and stealing the intellectual properties; thereby, rendering most IT industries to go out of businesses. They may find that understanding and translating IT security recommendations to implementable practices can be overwhelming. While this is a worthwhile and important task, there are also more practical ways to ensure you are using IT security best practices in your business. Therefore, the need to properly secure our IT environments in order to mitigate those attacks by using the right tools in all IT domains will be fully discussed in this research. This paper will focus more on protection of LAN-WAN Domain as a use case. en_US
dc.language.iso en en_US
dc.publisher Communication and Network en_US
dc.subject Mitigation and Assessment en_US
dc.subject Intellectual Property en_US
dc.subject Attacks en_US
dc.title Practical Approaches to Securing an IT Environment en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account