Publication: Third party security audit procedure for network environment
dc.citedby | 6 | |
dc.contributor.author | Bin Baharin K.N. | en_US |
dc.contributor.author | Din N.Md. | en_US |
dc.contributor.author | Jamaludin Md.Z. | en_US |
dc.contributor.author | Tahir N.Md. | en_US |
dc.contributor.authorid | 56872913600 | en_US |
dc.contributor.authorid | 9335429400 | en_US |
dc.contributor.authorid | 57216839721 | en_US |
dc.contributor.authorid | 56168849900 | en_US |
dc.date.accessioned | 2023-12-28T08:58:20Z | |
dc.date.available | 2023-12-28T08:58:20Z | |
dc.date.issued | 2003 | |
dc.description.abstract | Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 1188295 | |
dc.identifier.doi | 10.1109/NCTT.2003.1188295 | |
dc.identifier.epage | 30 | |
dc.identifier.scopus | 2-s2.0-84942424478 | |
dc.identifier.spage | 26 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84942424478&doi=10.1109%2fNCTT.2003.1188295&partnerID=40&md5=71b5c7241fce4a8d6ba012a69e5941ce | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/29932 | |
dc.pagecount | 4 | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Scopus | |
dc.sourcetitle | 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings | |
dc.subject | Communication system control | |
dc.subject | Computer networks | |
dc.subject | Educational institutions | |
dc.subject | Filtering | |
dc.subject | Filters | |
dc.subject | IP networks | |
dc.subject | Monitoring | |
dc.subject | Network operating systems | |
dc.subject | Protection | |
dc.subject | Software testing | |
dc.subject | Computer control systems | |
dc.subject | Computer networks | |
dc.subject | Computer operating systems | |
dc.subject | Computer system firewalls | |
dc.subject | Computer viruses | |
dc.subject | Filters (for fluids) | |
dc.subject | Filtration | |
dc.subject | Monitoring | |
dc.subject | Software testing | |
dc.subject | Communication system control | |
dc.subject | Educational institutions | |
dc.subject | IP networks | |
dc.subject | Network operating system | |
dc.subject | Protection | |
dc.subject | Network security | |
dc.title | Third party security audit procedure for network environment | en_US |
dc.type | Conference paper | en_US |
dspace.entity.type | Publication |