THE IMPACT OF VIRTUALIZATION MANAGEMENT ON NETWORK SECURITY IN NIGERIAN MANUFACTURING FIRMS
AbstractOver the years, methods have been proposed and new techniques have been put into place to try and stop hackers from gaining entry into other peopleâ€™s systems that leads downtime and loss of data, but all the methods have been proven fruitless because within a few months of installation, the system gets hacked. The research is focused on a proposed model, which will assist in analyzing the importance and significance of integrating virtualization and network management. The activities which are connected with integration process were carefully selected and evaluated. Quantitative results are shown for the effects of the integration of virtualization and management process. Firstly, the analysis showed that the selected activities of the integration of virtualization and network management will have significant effects on network security optimization. Which means that for a system to be effective secured, the main processes linked to the integration are to be carefully obeyed. Secondly the research analysis pointed out the network management process is important for virtualization. This thesis will provide means for further study to improve network security and network management as whole especially in large Nigerian production firms.
 Edney, J., & Arbaugh, W. A. (2003). Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Boston: Addison-Wesley Publishing.
 Geier, E. (2010, September 9). Four Hidden WLAN Security Threats. Retrieved March 21, 2014, from http://www.esecurityplanet.com/views/article.php/3902791/Four-Hidden-WLAN-Security-Threats.htm.
 Geier, E. (2013, October 7). 5 Wi-Fi security myths you must abandon now. Retrieved March 21, 2014, from http://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.html
 Idrissi, Y., Zahid, N., & Jedra, M. (2012). Security analysis of 3GPP (LTE) â€” WLAN interworking and a new local authentication method based on EAP-AKA. London: Future Generation Communication Technology (FGCT), 2012 International Conference (pp. 137-142). doi: 10.1109/FGCT.2012.6476561.
 Keim, D., Mansmann, F., Schneidewind, J., & Zeigler, H. (2006). Challenges in visual data analysis. Information Visualization, 2006. IV 2006. Tenth International Conference England: IEEE.
 Kundu, A., Bhunia, S., Misra, I. S., & Sanyal, S.K. (2010). Comparison of VoIP Performance over WiMAX, WLAN and WiMAX-WLAN Integrated Network Using OPNET. Communications in Computer and Information Science, 90, 319-325.
 Roos, T., MyllymÃ¤ki, P., Tirri, H., Misikangas, P., & SievÃ¤nen, J. (2002). A Probabilistic Approach to WLAN User Location Estimation. International Journal of Wireless Information Networks, 9(3), 155-164.
 Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Lecture Notes in Computer Science, 6571, 53-70.
 Whitelaw, R. (2007). New investigation, both theoretical and experimental, on the mechanism and coefficient of rolling adhesion. Vehicle System Dynamics: International Journal of Vehicle Mechanics and Mobility, 6(2-3), 115-116. Doi: 10.1080/00423117708968518, 115-116.
 Zabriskie, S. (2009, July 20). XP Firewall Setup. Retrieved March 16, 2014
Copyright Transfer Agreement
International Journal of Scientific Research in Information Systems and Engineering (IJSRISE)
pISSN 2380-8128, eISSN 2380-5579
The copyright to (Manuscript title): -------------------------------------------------------------- (hence forward referred to as the Manuscript)
By the author(s): ------------------------------------ (hence forward referred to as the Author(s))
is hereby transferred to Anglo-American Publications LLC, 3422 Old Capitol Trail, Suite 700, Wilmington, Delaware,19808-6192, USA, , the publisher of the journal International Journal of Scientific Research in Information Systems and Engineering (IJSRISE) (henceforward referred to as the Publisher and the Journal, respectively). The transfer becomes effective once the article is accepted for publication. If the submitted manuscript is not accepted for publication by the Journal, all rights shall be retained by the Author(s).
The Author(s) warrant that their manuscript is their original work that has not been published before; that it is not under consideration for publication elsewhere; and that its publication has been approved by all co-authors, if any, as well as tacitly or explicitly by the responsible authorities at the institution where the work was carried out. The Author(s) affirm that the article contains no unfounded or unlawful statements and does not violate the rights of others. If copyrighted works are included, the Author(s) bear responsibility to obtain written permission from the copyright owners. The Corresponding author, as the signing author, warrants that he/she has full power to make this grant on behalf of the Author(s).
By signing this agreement, the Corresponding author grants to the Publisher the following rights to the Manuscript, including any supplemental material, and any parts, extracts or elements thereof:
- the right to reproduce and distribute the Manuscript in printed form, including print-on-demand;
- the right to produce prepublications, reprints, and special editions of the Manuscript;
- the right to translate the Manuscript into other languages;
- the right to reproduce the Manuscript using photomechanical or similar means including, but not limited to photocopy, and the right to distribute these reproductions;
- the right to reproduce and distribute the Manuscript electronically or optically on any and all data carriers or storage media – especially in machine readable/digitalized form on data carriers such as hard drive, CD-Rom, DVD, Blu-ray Disc (BD), Mini-Disk, data tape – and the right to reproduce and distribute the Article via these data carriers;
- the right to store the Manuscript in databases, including online databases, and the right of transmission of the Manuscript in all technical systems and modes;
- the right to make the Manuscript available to the public or to closed user groups on individual demand, for use on monitors or other readers (including e-books), and in printable form for the user, either via the internet, other online services, or via internal or external networks.
Articles published in the Journal are Open-Access articles distributed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The Journal allows Author(s) to deposit Author's Post-print (accepted version) and Publisher's version/PDF in an institutional repository and non-commercial subject-based repositories, such as PubMed Central, Europe PMC, arXiv and other repositories, or to publish it on Author's personal website and departmental website (including social networking sites, such as ResearchGate, Academia.edu, etc.), at any time after publication and/or departmental website, at any time after publication on the website of the author’s institution in compliance with the Creative Commons Attibution – NonCommercial – NoDerrivatives 4.0 (https://creativecommons.org/licenses/by-nc-nd/4.0/), at any time after the publication in the journal. Publisher copyright and source must be acknowledged and a link must be made to the article's DOI.
Upon receiving the proofs, the Author(s) agree to promptly check the proofs carefully, correct any typographical errors, and authorize the publication of the corrected proofs.
The Corresponding author agrees to inform his/her co-authors, of any of the above terms.