Third party security audit procedure for network environment

Khaiml Nasihin Bin Baharin, Norashidah Md Din, Md Zaini Jamaludin, Nooritawati Md Tahir

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure.

Original languageEnglish
Title of host publication4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages26-30
Number of pages5
ISBN (Electronic)0780377737, 9780780377738
DOIs
Publication statusPublished - 01 Jan 2003
Event4th National Conference on Telecommunication Technology, NCTT 2003 - Shah Alam, Malaysia
Duration: 14 Jan 200315 Jan 2003

Publication series

Name4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings

Other

Other4th National Conference on Telecommunication Technology, NCTT 2003
CountryMalaysia
CityShah Alam
Period14/01/0315/01/03

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Third party security audit procedure for network environment'. Together they form a unique fingerprint.

  • Cite this

    Bin Baharin, K. N., Din, N. M., Jamaludin, M. Z., & Tahir, N. M. (2003). Third party security audit procedure for network environment. In 4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings (pp. 26-30). [1188295] (4th National Conference on Telecommunication Technology, NCTT 2003 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/NCTT.2003.1188295