Show simple item record

dc.contributor.authorJohn C, Fuller
dc.contributor.authorCofie, Penrose
dc.contributor.authorWarsame H, Ali
dc.contributor.authorEmmanuel S., Kolawole
dc.date.accessioned2018-05-11T12:10:47Z
dc.date.available2018-05-11T12:10:47Z
dc.date.issued2017-11
dc.identifier.citationCommunication and Network Vol.9 No.4, November 2017en_US
dc.identifier.urihttp://hdl.handle.net/123456789/1317
dc.description.abstractThere are a number of IT Security journals available in the literature but none of these research papers have practically specified approaches to secure the IT environment at large. In this paper, more emphases will be laid on the practical ways to secure our IT environments and with some useful real-life scenarios. In today, securing our IT environment has become the key factor in the industry due to an increasing number of attackers invading and stealing the intellectual properties; thereby, rendering most IT industries to go out of businesses. They may find that understanding and translating IT security recommendations to implementable practices can be overwhelming. While this is a worthwhile and important task, there are also more practical ways to ensure you are using IT security best practices in your business. Therefore, the need to properly secure our IT environments in order to mitigate those attacks by using the right tools in all IT domains will be fully discussed in this research. This paper will focus more on protection of LAN-WAN Domain as a use case.en_US
dc.language.isoenen_US
dc.publisherCommunication and Networken_US
dc.subjectMitigation and Assessmenten_US
dc.subjectIntellectual Propertyen_US
dc.subjectAttacksen_US
dc.titlePractical Approaches to Securing an IT Environmenten_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record