DocumentCode :
3314181
Title :
Third party security audit procedure for network environment
Author :
Bin Baharin, Khairul Nasihin ; Din, Norashidah Md ; Jamaludin, Md Zaini ; Tahir, Nooritawati Md
Author_Institution :
Coll. of Eng., Universiti Tenaga Nasional, Selangor, Malaysia
fYear :
2003
fDate :
14-15 Jan. 2003
Firstpage :
26
Lastpage :
30
Abstract :
Defending one´s systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization´s security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure.
Keywords :
authorisation; business communication; computer network management; computer networks; telecommunication security; computing systems; firewalls; network perimeter defence; network posture vulnerabilities; network security; security policy; third party security audit procedure; unauthorized access; Communication system control; Computer networks; Educational institutions; Filtering; Filters; IP networks; Monitoring; Network operating systems; Protection; Software testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on
Print_ISBN :
0-7803-7773-7
Type :
conf
DOI :
10.1109/NCTT.2003.1188295
Filename :
1188295
Link To Document :
بازگشت