Show simple item record

dc.contributor.authorNamunaba, Frank Maturu
dc.date.accessioned2020-08-22T05:51:43Z
dc.date.available2020-08-22T05:51:43Z
dc.date.issued2014-10-14
dc.identifier.urihttp://41.89.49.50/handle/123456789/81
dc.description.abstractThe evolution of communication networks has resulted into complex interconnection of devices in wired/wireless networks. While these networks have many benefits, there are security concerns for private and public networks because of untrusted networks and malicious individuals. The Network Security Administrator is concerned with the security and safety of networks in to prevent and mitigate malicious attacks and network security breaches. There are many commercial and free automated tools that can be used to ensure private/public networks are secure. There is however no framework that can be used to select appropriate tools that will ensure network security. Traditional Network Security use Firewall, Network Address Translation, Virtual Private Network, Network Router or a Proxy server to defense.en_US
dc.language.isoenen_US
dc.subjectVulnerability Assessment tools, Intrusion Detection, Inside Looking Around Attack, Outside Looking in Attack, Network Based Attack, Host Based Attack, Network Misuse Detection, Network Anomaly Detection, Firewall, Network Address Translation, Virtual Private Network, Network Router, Proxy Serveren_US
dc.titleAn evaluation of network vulnerability assessment toolsen_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record