Publication:
Third party security audit procedure for network environment

dc.citedby6
dc.contributor.authorBin Baharin K.N.en_US
dc.contributor.authorDin N.Md.en_US
dc.contributor.authorJamaludin Md.Z.en_US
dc.contributor.authorTahir N.Md.en_US
dc.contributor.authorid56872913600en_US
dc.contributor.authorid9335429400en_US
dc.contributor.authorid57216839721en_US
dc.contributor.authorid56168849900en_US
dc.date.accessioned2023-12-28T08:58:20Z
dc.date.available2023-12-28T08:58:20Z
dc.date.issued2003
dc.description.abstractDefending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo1188295
dc.identifier.doi10.1109/NCTT.2003.1188295
dc.identifier.epage30
dc.identifier.scopus2-s2.0-84942424478
dc.identifier.spage26
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84942424478&doi=10.1109%2fNCTT.2003.1188295&partnerID=40&md5=71b5c7241fce4a8d6ba012a69e5941ce
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/29932
dc.pagecount4
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitle4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings
dc.subjectCommunication system control
dc.subjectComputer networks
dc.subjectEducational institutions
dc.subjectFiltering
dc.subjectFilters
dc.subjectIP networks
dc.subjectMonitoring
dc.subjectNetwork operating systems
dc.subjectProtection
dc.subjectSoftware testing
dc.subjectComputer control systems
dc.subjectComputer networks
dc.subjectComputer operating systems
dc.subjectComputer system firewalls
dc.subjectComputer viruses
dc.subjectFilters (for fluids)
dc.subjectFiltration
dc.subjectMonitoring
dc.subjectSoftware testing
dc.subjectCommunication system control
dc.subjectEducational institutions
dc.subjectIP networks
dc.subjectNetwork operating system
dc.subjectProtection
dc.subjectNetwork security
dc.titleThird party security audit procedure for network environmenten_US
dc.typeConference paperen_US
dspace.entity.typePublication
Files
Collections