Third party security audit procedure for network environment
Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...
Saved in:
Main Authors: | Bin Baharin K.N., Din N.Md., Jamaludin Md.Z., Tahir N.Md. |
---|---|
Other Authors: | 56872913600 |
Format: | Conference paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021) -
Business trunking solution for IP PBX technology in IP multimedia subsystem (IMS) network architecture / Alif Amir Mohd Sholeh
by: Mohd Sholeh, Alif Amir
Published: (2016) -
Voice over internet protocol (VoIP) i Talk Technology / Latifah Mohd. Yusoff
by: Mohd. Yusoff, Latifah
Published: (2002) -
Analysis and simulation of handoff scenario for wireless communication network / Darul Ridzuan Muhamad Halib
by: Muhamad Halib, Darul Ridzuan
Published: (2006) -
The design and implementation of multi protocol monitoring system (NGN-IMS) / Suhaili Yahaya
by: Yahaya, Suhaili
Published: (2016)