Third party security audit procedure for network environment

Khaiml Nasihin Bin Baharin, Norashidah Md Din, Md Zaini Jamaludin, Nooritawati Md Tahir

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure.

Original languageEnglish
Title of host publication4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages26-30
Number of pages5
ISBN (Electronic)0780377737, 9780780377738
DOIs
Publication statusPublished - 2003
Event4th National Conference on Telecommunication Technology, NCTT 2003 - Shah Alam, Malaysia
Duration: 14 Jan 200315 Jan 2003

Other

Other4th National Conference on Telecommunication Technology, NCTT 2003
CountryMalaysia
CityShah Alam
Period14/01/0315/01/03

Fingerprint

Network security
Industry

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Bin Baharin, K. N., Md Din, N., Jamaludin, M. Z., & Tahir, N. M. (2003). Third party security audit procedure for network environment. In 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings (pp. 26-30). [1188295] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/NCTT.2003.1188295
Bin Baharin, Khaiml Nasihin ; Md Din, Norashidah ; Jamaludin, Md Zaini ; Tahir, Nooritawati Md. / Third party security audit procedure for network environment. 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2003. pp. 26-30
@inproceedings{e65fc977d0914e84ba5613a3027489ff,
title = "Third party security audit procedure for network environment",
abstract = "Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure.",
author = "{Bin Baharin}, {Khaiml Nasihin} and {Md Din}, Norashidah and Jamaludin, {Md Zaini} and Tahir, {Nooritawati Md}",
year = "2003",
doi = "10.1109/NCTT.2003.1188295",
language = "English",
pages = "26--30",
booktitle = "4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Bin Baharin, KN, Md Din, N, Jamaludin, MZ & Tahir, NM 2003, Third party security audit procedure for network environment. in 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings., 1188295, Institute of Electrical and Electronics Engineers Inc., pp. 26-30, 4th National Conference on Telecommunication Technology, NCTT 2003, Shah Alam, Malaysia, 14/01/03. https://doi.org/10.1109/NCTT.2003.1188295

Third party security audit procedure for network environment. / Bin Baharin, Khaiml Nasihin; Md Din, Norashidah; Jamaludin, Md Zaini; Tahir, Nooritawati Md.

4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2003. p. 26-30 1188295.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Third party security audit procedure for network environment

AU - Bin Baharin, Khaiml Nasihin

AU - Md Din, Norashidah

AU - Jamaludin, Md Zaini

AU - Tahir, Nooritawati Md

PY - 2003

Y1 - 2003

N2 - Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure.

AB - Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure.

UR - http://www.scopus.com/inward/record.url?scp=84942424478&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84942424478&partnerID=8YFLogxK

U2 - 10.1109/NCTT.2003.1188295

DO - 10.1109/NCTT.2003.1188295

M3 - Conference contribution

SP - 26

EP - 30

BT - 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Bin Baharin KN, Md Din N, Jamaludin MZ, Tahir NM. Third party security audit procedure for network environment. In 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2003. p. 26-30. 1188295 https://doi.org/10.1109/NCTT.2003.1188295