• Johnson OLU-EGBUNIWE University of Mediterranean Karpasia


Over the years, methods have been proposed and new techniques have been put into place to try and stop hackers from gaining entry into other people’s systems that leads downtime and loss of data, but all the methods have been proven fruitless because within a few months of installation, the system gets hacked.  The research is focused on a proposed model, which will assist in analyzing the importance and significance of integrating virtualization and network management. The activities which are connected with integration process were carefully selected and evaluated. Quantitative results are shown for the effects of the integration of virtualization and management process. Firstly, the analysis showed that the selected activities of the integration of virtualization and network management will have significant effects on network security optimization. Which means that for a system to be effective secured, the main processes linked to the integration are to be carefully obeyed. Secondly the research analysis pointed out the network management process is important for virtualization. This thesis will provide means for further study to improve network security and network management as whole especially in large Nigerian production firms. 


[1] Dimitrios, Z., & Dimitrios, L. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 583-592.

[2] Edney, J., & Arbaugh, W. A. (2003). Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Boston: Addison-Wesley Publishing.

[3] Geier, E. (2010, September 9). Four Hidden WLAN Security Threats. Retrieved March 21, 2014, from
[4] Geier, E. (2013, October 7). 5 Wi-Fi security myths you must abandon now. Retrieved March 21, 2014, from
[5] Idrissi, Y., Zahid, N., & Jedra, M. (2012). Security analysis of 3GPP (LTE) — WLAN interworking and a new local authentication method based on EAP-AKA. London: Future Generation Communication Technology (FGCT), 2012 International Conference (pp. 137-142). doi: 10.1109/FGCT.2012.6476561.
[6] Keim, D., Mansmann, F., Schneidewind, J., & Zeigler, H. (2006). Challenges in visual data analysis. Information Visualization, 2006. IV 2006. Tenth International Conference England: IEEE.

[7] Kundu, A., Bhunia, S., Misra, I. S., & Sanyal, S.K. (2010). Comparison of VoIP Performance over WiMAX, WLAN and WiMAX-WLAN Integrated Network Using OPNET. Communications in Computer and Information Science, 90, 319-325.

[8] Roos, T., Myllymäki, P., Tirri, H., Misikangas, P., & Sievänen, J. (2002). A Probabilistic Approach to WLAN User Location Estimation. International Journal of Wireless Information Networks, 9(3), 155-164.
[9] Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Lecture Notes in Computer Science, 6571, 53-70.

[10] Whitelaw, R. (2007). New investigation, both theoretical and experimental, on the mechanism and coefficient of rolling adhesion. Vehicle System Dynamics: International Journal of Vehicle Mechanics and Mobility, 6(2-3), 115-116. Doi: 10.1080/00423117708968518, 115-116.

[11] Zabriskie, S. (2009, July 20). XP Firewall Setup. Retrieved March 16, 2014
How to Cite
OLU-EGBUNIWE, Johnson. THE IMPACT OF VIRTUALIZATION MANAGEMENT ON NETWORK SECURITY IN NIGERIAN MANUFACTURING FIRMS. International Journal of Scientific Research in Information Systems and Engineering (IJSRISE), [S.l.], v. 3, n. 2, p. 47-59, sep. 2017. ISSN 2380-5579. Available at: <>. Date accessed: 19 june 2018.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.