AN OVERVIEW OF MODERN TELECOMMUNICATION NETWORKS SECURITY CHALLENGES
Abstract and keywords
Abstract (English):
Not long ago, digital security was not seeing as everybody’s business, very unlike nowadays when everyone believe that it is imperative that computing and networking systems operate securely. And this is of utmost importance as many aspects of our business and private life rely on computing systems and telecommunication networks. Telecommunication networks security promotes trust among stakeholders. This paper presents an overview of challenges facing modern telecommunication networks security and suggest ways forward at facing those challenges.

Keywords:
network security, cyber security, e-commerce, security awareness, security training
Text
Text (PDF): Read Download

ОБЗОР ЗАДАЧ БЕЗОПАСНОСТИ СОВРЕМЕННЫХ ТЕЛЕКОММУНИКАЦИОННЫХ СЕТЕЙ
References

1. Kevin Fitchard. (in press). 2013: The year mobile data revenue will eclipse voice in the US. Retrieved from http://gigaom. com/2013/03/13/2013-the-year-mobile-datarevenue-will-eclipse-voice-in-the-us/.

2. E-marketer. (20103). B2C Ecommerce Climbs Worldwide, as Emerging Markets Drive Sales Higher. Retrieved from http://www. emarketer.com/Article/ B2C-EcommerceClimbs-Worldwide-Emerging-Markets-DriveSales-Higher/ 1010004.

3. Keneth C. Laudon and Jane P. Laudon. (2007). Managing the Digital Firm. International Journal of Computers, Communications & Control Vol. II, No. 1, pp. 103-105.

4. ITU. (2013). ICT Facts and Figures [PDF file]. Retrieved from ITU website:http://www.itu.int/en/ITU-D/Statistics/Documents/ facts/ICTFactsFigures2013. pdf.

5. ITU. (2013). Mobile-cellular telephone subscriptions [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/ Statistics/Documents /statistics /2013/Mobile_ cellular_2000-2012.xls.

6. ITU. (2013). Percentage of Individuals using the Internet [Excel file]. Retrieved from ITU website: http://www.itu.int/en/ITU-D/Statistics/Documents /statistics/2013/Individuals_ Internet_2000-2012.xls.

7. yStats. (2013). Global B2C E-Commerce and Online Payment Report 2013 [Brochure]. Retrieved from http://www.ystats.com/en/reports/preview.php? reportId=1033&start=0.

8. yStats. (2012). Africa Internet & B2C E-Commerce Report 2012 [Brochure]. Retrieved from http://www.ystats.com/en/reports/ preview.php?reportId= 939&start=0.

9. Biztech Africa. (2013). Kenya Internet users surpass 16 million. Retrieved from http:// www.biztechafrica.com/article/kenya-internet-users-surpass-16-million /5806/.

10. Dr KF Lai. (2013). Africa finding its own solutions using mobile tech. Retrieved from http://www.bizcommunity.com/Article/111/394/88287.html.

11. CCK Kenya. (2013). Kenya Declares War on Cybercriminals. Retrieved from http:// www.cck.go.ke/news/2013/War_on_cybercrime.html.

12. iResearch. (2013). 2012-2013 China Online Shopper Behavior Report. Retrieved from http://www.iresearchchina.com/reports/ 4830.html.

13. Premium Times Nigeria. (2013). Gay Activist Hacks Nigerian Government’s Website Over Country’s Anti-Gay Law. Retrieved from http:// premium-timesng.com/news/140270gay-activist-hacks-nigerian-governmentswebsite-over-countrys-anti-gay-law.html.

14. The Telegraph UK. (2009). Thousands of NHS medical records lost. Retrieved from http://www.telegraph.co.uk/health/healthnews/5381605/Thousands-of-NHS-medicalrecords-lost.html.

15. PRWeb. (2013). Nuspire Networks Study Reveals Rise in IT Network Security Vulnerabilities at Remote Locations. Retrieved from http://www.prweb.com /releases/2013/ nuspire/prweb10873482.htm.

Login or Create
* Forgot password?