Please use this identifier to cite or link to this item: http://dspace2020.uniten.edu.my:8080/handle/123456789/6613
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBin Baharin, K.N.
dc.contributor.authorDin, N.Md.
dc.contributor.authorJamaludin, Md.Z.
dc.contributor.authorTahir, N.Md.
dc.date.accessioned2017-12-08T09:52:04Z-
dc.date.available2017-12-08T09:52:04Z-
dc.date.issued2003
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/6613-
dc.description.abstractDefending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is governed by the organization's security policy. The paper describes a security audit procedure based on network posture vulnerabilities. The scope of the work covers some discussion on network perimeter defence and suggestions for the audit procedure. © 2003 IEEE.
dc.titleThird party security audit procedure for network environment
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:COE Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.