Third party security audit procedure for network environment

Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin Baharin K.N., Din N.Md., Jamaludin Md.Z., Tahir N.Md.
Other Authors: 56872913600
Format: Conference paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-29932
record_format dspace
spelling my.uniten.dspace-299322023-12-28T16:58:20Z Third party security audit procedure for network environment Bin Baharin K.N. Din N.Md. Jamaludin Md.Z. Tahir N.Md. 56872913600 9335429400 57216839721 56168849900 Communication system control Computer networks Educational institutions Filtering Filters IP networks Monitoring Network operating systems Protection Software testing Computer control systems Computer networks Computer operating systems Computer system firewalls Computer viruses Filters (for fluids) Filtration Monitoring Software testing Communication system control Educational institutions IP networks Network operating system Protection Network security Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE. Final 2023-12-28T08:58:20Z 2023-12-28T08:58:20Z 2003 Conference paper 10.1109/NCTT.2003.1188295 2-s2.0-84942424478 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84942424478&doi=10.1109%2fNCTT.2003.1188295&partnerID=40&md5=71b5c7241fce4a8d6ba012a69e5941ce https://irepository.uniten.edu.my/handle/123456789/29932 1188295 26 30 Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Communication system control
Computer networks
Educational institutions
Filtering
Filters
IP networks
Monitoring
Network operating systems
Protection
Software testing
Computer control systems
Computer networks
Computer operating systems
Computer system firewalls
Computer viruses
Filters (for fluids)
Filtration
Monitoring
Software testing
Communication system control
Educational institutions
IP networks
Network operating system
Protection
Network security
spellingShingle Communication system control
Computer networks
Educational institutions
Filtering
Filters
IP networks
Monitoring
Network operating systems
Protection
Software testing
Computer control systems
Computer networks
Computer operating systems
Computer system firewalls
Computer viruses
Filters (for fluids)
Filtration
Monitoring
Software testing
Communication system control
Educational institutions
IP networks
Network operating system
Protection
Network security
Bin Baharin K.N.
Din N.Md.
Jamaludin Md.Z.
Tahir N.Md.
Third party security audit procedure for network environment
description Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE.
author2 56872913600
author_facet 56872913600
Bin Baharin K.N.
Din N.Md.
Jamaludin Md.Z.
Tahir N.Md.
format Conference paper
author Bin Baharin K.N.
Din N.Md.
Jamaludin Md.Z.
Tahir N.Md.
author_sort Bin Baharin K.N.
title Third party security audit procedure for network environment
title_short Third party security audit procedure for network environment
title_full Third party security audit procedure for network environment
title_fullStr Third party security audit procedure for network environment
title_full_unstemmed Third party security audit procedure for network environment
title_sort third party security audit procedure for network environment
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2023
_version_ 1806427868046032896