Third party security audit procedure for network environment

Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin Baharin K.N., Din N.Md., Jamaludin Md.Z., Tahir N.Md.
Other Authors: 56872913600
Format: Conference paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833412267434049536
author Bin Baharin K.N.
Din N.Md.
Jamaludin Md.Z.
Tahir N.Md.
author2 56872913600
author_facet 56872913600
Bin Baharin K.N.
Din N.Md.
Jamaludin Md.Z.
Tahir N.Md.
author_sort Bin Baharin K.N.
building UNITEN Library
collection Institutional Repository
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
continent Asia
country Malaysia
description Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE.
format Conference paper
id my.uniten.dspace-29932
institution Universiti Tenaga Nasional
publishDate 2023
publisher Institute of Electrical and Electronics Engineers Inc.
record_format dspace
spelling my.uniten.dspace-299322023-12-28T16:58:20Z Third party security audit procedure for network environment Bin Baharin K.N. Din N.Md. Jamaludin Md.Z. Tahir N.Md. 56872913600 9335429400 57216839721 56168849900 Communication system control Computer networks Educational institutions Filtering Filters IP networks Monitoring Network operating systems Protection Software testing Computer control systems Computer networks Computer operating systems Computer system firewalls Computer viruses Filters (for fluids) Filtration Monitoring Software testing Communication system control Educational institutions IP networks Network operating system Protection Network security Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. � 2003 IEEE. Final 2023-12-28T08:58:20Z 2023-12-28T08:58:20Z 2003 Conference paper 10.1109/NCTT.2003.1188295 2-s2.0-84942424478 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84942424478&doi=10.1109%2fNCTT.2003.1188295&partnerID=40&md5=71b5c7241fce4a8d6ba012a69e5941ce https://irepository.uniten.edu.my/handle/123456789/29932 1188295 26 30 Institute of Electrical and Electronics Engineers Inc. Scopus
spellingShingle Communication system control
Computer networks
Educational institutions
Filtering
Filters
IP networks
Monitoring
Network operating systems
Protection
Software testing
Computer control systems
Computer networks
Computer operating systems
Computer system firewalls
Computer viruses
Filters (for fluids)
Filtration
Monitoring
Software testing
Communication system control
Educational institutions
IP networks
Network operating system
Protection
Network security
Bin Baharin K.N.
Din N.Md.
Jamaludin Md.Z.
Tahir N.Md.
Third party security audit procedure for network environment
title Third party security audit procedure for network environment
title_full Third party security audit procedure for network environment
title_fullStr Third party security audit procedure for network environment
title_full_unstemmed Third party security audit procedure for network environment
title_short Third party security audit procedure for network environment
title_sort third party security audit procedure for network environment
topic Communication system control
Computer networks
Educational institutions
Filtering
Filters
IP networks
Monitoring
Network operating systems
Protection
Software testing
Computer control systems
Computer networks
Computer operating systems
Computer system firewalls
Computer viruses
Filters (for fluids)
Filtration
Monitoring
Software testing
Communication system control
Educational institutions
IP networks
Network operating system
Protection
Network security
url_provider http://dspace.uniten.edu.my/