Third party security audit procedure for network environment

Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin Baharin, K.N., Din, N.Md., Jamaludin, Md.Z., Tahir, N.Md.
Format:
Published: 2017
Online Access:http://dspace.uniten.edu.my/jspui/handle/123456789/6613
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-6613
record_format dspace
spelling my.uniten.dspace-66132017-12-08T09:52:04Z Third party security audit procedure for network environment Bin Baharin, K.N. Din, N.Md. Jamaludin, Md.Z. Tahir, N.Md. Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. © 2003 IEEE. 2017-12-08T09:52:04Z 2017-12-08T09:52:04Z 2003 http://dspace.uniten.edu.my/jspui/handle/123456789/6613
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. © 2003 IEEE.
format
author Bin Baharin, K.N.
Din, N.Md.
Jamaludin, Md.Z.
Tahir, N.Md.
spellingShingle Bin Baharin, K.N.
Din, N.Md.
Jamaludin, Md.Z.
Tahir, N.Md.
Third party security audit procedure for network environment
author_facet Bin Baharin, K.N.
Din, N.Md.
Jamaludin, Md.Z.
Tahir, N.Md.
author_sort Bin Baharin, K.N.
title Third party security audit procedure for network environment
title_short Third party security audit procedure for network environment
title_full Third party security audit procedure for network environment
title_fullStr Third party security audit procedure for network environment
title_full_unstemmed Third party security audit procedure for network environment
title_sort third party security audit procedure for network environment
publishDate 2017
url http://dspace.uniten.edu.my/jspui/handle/123456789/6613
_version_ 1644493979186626560
score 13.160551