Third party security audit procedure for network environment
Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Tenaga Nasional |
id |
my.uniten.dspace-29932 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-299322023-12-28T16:58:20Z Third party security audit procedure for network environment Bin Baharin K.N. Din N.Md. Jamaludin Md.Z. Tahir N.Md. 56872913600 9335429400 57216839721 56168849900 Communication system control Computer networks Educational institutions Filtering Filters IP networks Monitoring Network operating systems Protection Software testing Computer control systems Computer networks Computer operating systems Computer system firewalls Computer viruses Filters (for fluids) Filtration Monitoring Software testing Communication system control Educational institutions IP networks Network operating system Protection Network security Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE. Final 2023-12-28T08:58:20Z 2023-12-28T08:58:20Z 2003 Conference paper 10.1109/NCTT.2003.1188295 2-s2.0-84942424478 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84942424478&doi=10.1109%2fNCTT.2003.1188295&partnerID=40&md5=71b5c7241fce4a8d6ba012a69e5941ce https://irepository.uniten.edu.my/handle/123456789/29932 1188295 26 30 Institute of Electrical and Electronics Engineers Inc. Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
Communication system control Computer networks Educational institutions Filtering Filters IP networks Monitoring Network operating systems Protection Software testing Computer control systems Computer networks Computer operating systems Computer system firewalls Computer viruses Filters (for fluids) Filtration Monitoring Software testing Communication system control Educational institutions IP networks Network operating system Protection Network security |
spellingShingle |
Communication system control Computer networks Educational institutions Filtering Filters IP networks Monitoring Network operating systems Protection Software testing Computer control systems Computer networks Computer operating systems Computer system firewalls Computer viruses Filters (for fluids) Filtration Monitoring Software testing Communication system control Educational institutions IP networks Network operating system Protection Network security Bin Baharin K.N. Din N.Md. Jamaludin Md.Z. Tahir N.Md. Third party security audit procedure for network environment |
description |
Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE. |
author2 |
56872913600 |
author_facet |
56872913600 Bin Baharin K.N. Din N.Md. Jamaludin Md.Z. Tahir N.Md. |
format |
Conference paper |
author |
Bin Baharin K.N. Din N.Md. Jamaludin Md.Z. Tahir N.Md. |
author_sort |
Bin Baharin K.N. |
title |
Third party security audit procedure for network environment |
title_short |
Third party security audit procedure for network environment |
title_full |
Third party security audit procedure for network environment |
title_fullStr |
Third party security audit procedure for network environment |
title_full_unstemmed |
Third party security audit procedure for network environment |
title_sort |
third party security audit procedure for network environment |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2023 |
_version_ |
1806427868046032896 |