Dissertations and Theses @ UNI


Open Access Thesis


Computer networks--Security measures.; Computer networks--Security measures;


This paper begins focusing on network security issues. The areas of physical security, access security, and connection security are explored. Connection security provides the biggest need for improvement in the entire security field. This type of security is managed best with firewall implementations. Various firewall models are discussed.

Software evaluations were performed on three different commercial Internet security tools. The software was compared on the basis of ease of installation, functionality, level of security provided, and output available. In summary, the value of the firewall is dependent on the need to implement a firewall in an organization.

However, a security policy is necessary to provide direction for configuring the firewall. Further studies into the creation, publication, and enforcement of security policies were conducted. Security policies are currently being created reactively instead of preventatively to manage security breaches as they occur. To better understand how security policies need to be implemented, case studies were conducted in three educational departments and a local Internet service provider.

While the case studies were being reviewed, security policies for the study participants came to fruition and the enforcing has finally begun. Conclusions from these case studies are that policies need to be better publicized and increasing manpower is necessary to enforce them.

Further work on network security could include creating proactive security policies and how to successfully publicize and implement them. Continual monitoring of security faults and advertising weaknesses will increase interest in security abroad. This will improve the availability of security management systems and assist persuading employers to increase staffing to provide network security personnel positions.

Year of Submission


Degree Name

Master of Science


Department of Computer Science

First Advisor

Janet Drake


If you are the rightful copyright holder of this thesis and wish to have it removed from the Open Access Collection, please submit a request to scholarworks@uni.edu and include clear identification of the work, preferably with URL.

Date Original


Object Description

1 PDF file (75 pages)



File Format