Third party security audit procedure for network environment

Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin Baharin, K.N., Din, N.Md., Jamaludin, Md.Z., Tahir, N.Md.
Format:
Published: 2018
Online Access:http://dspace.uniten.edu.my/jspui/handle/123456789/7208
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-7208
record_format dspace
spelling my.uniten.dspace-72082018-04-28T16:41:55Z Third party security audit procedure for network environment Bin Baharin, K.N. Din, N.Md. Jamaludin, Md.Z. Tahir, N.Md. Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. © 2003 IEEE. 2018-01-11T09:11:14Z 2018-01-11T09:11:14Z 2003 http://dspace.uniten.edu.my/jspui/handle/123456789/7208
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. © 2003 IEEE.
format
author Bin Baharin, K.N.
Din, N.Md.
Jamaludin, Md.Z.
Tahir, N.Md.
spellingShingle Bin Baharin, K.N.
Din, N.Md.
Jamaludin, Md.Z.
Tahir, N.Md.
Third party security audit procedure for network environment
author_facet Bin Baharin, K.N.
Din, N.Md.
Jamaludin, Md.Z.
Tahir, N.Md.
author_sort Bin Baharin, K.N.
title Third party security audit procedure for network environment
title_short Third party security audit procedure for network environment
title_full Third party security audit procedure for network environment
title_fullStr Third party security audit procedure for network environment
title_full_unstemmed Third party security audit procedure for network environment
title_sort third party security audit procedure for network environment
publishDate 2018
url http://dspace.uniten.edu.my/jspui/handle/123456789/7208
_version_ 1644494136298962944
score 13.160551