Network Security Management Audit at UUM Computer Centre

An organization needs to evaluate its network security in order to measure accountability, confidentiality, integrity, authority and also its authenticity. The method that is commonly used for this purpose is by conducting an audit. Using the auditing method, this research attempts to evaluate the...

Full description

Saved in:
Bibliographic Details
Main Author: Mohamad Fadli, Zolkipli
Format: Thesis
Language:eng
eng
Published: 2004
Subjects:
Online Access:https://etd.uum.edu.my/1311/1/MOHAMAD_FADLI_ZOLKIPLI.pdf
https://etd.uum.edu.my/1311/2/1.MOHAMAD_FADLI_ZOLKIPLI.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.1311
record_format uketd_dc
spelling my-uum-etd.13112013-07-24T12:11:24Z Network Security Management Audit at UUM Computer Centre 2004 Mohamad Fadli, Zolkipli Faculty of Information Technology Faculty of Information Technology TK5101-6720 Telecommunication An organization needs to evaluate its network security in order to measure accountability, confidentiality, integrity, authority and also its authenticity. The method that is commonly used for this purpose is by conducting an audit. Using the auditing method, this research attempts to evaluate the network security at the UUM Computer Centre. The purpose of this paper is to identify the network security deficiencies at UUM Computer Centre. Results from the network security audit will then be used to recommend solution to improve those loopholes. The selected audit method is based on the Information Protection and Security Division of University Computing Services (IP & SD UCS), from The State University of New Jersey. 2004 Thesis https://etd.uum.edu.my/1311/ https://etd.uum.edu.my/1311/1/MOHAMAD_FADLI_ZOLKIPLI.pdf application/pdf eng validuser https://etd.uum.edu.my/1311/2/1.MOHAMAD_FADLI_ZOLKIPLI.pdf application/pdf eng public masters masters Universiti Utara Malaysia Baltatu, M. Lioy, A. Maino, F & Mazzocchi, D. (2000). Security issues in control,management and routing protocols. Computer network. Vol.34. pp.881-894. BICSI (2001). Chapter 8 Network Security; Network Design Reference Manual. 4th Edition. Cisco System (2001). A Beginner's Guide to Network Security. United States of America; Cisco Press. Retrieved August 24,2003, from http://www.pcconnection.com Desrosiers, M. (2003). Security Analysis and Audit. A.P. Lawrence Home. Retrieved March 20, 2004, from http://www.aplawrence.com/MDesrosiers/securiyaudit.html Federal Information Processing Standards (1994). Specifications for Guideline for The Analysis Local Area Network Security. Federal Information Processing Standards Publication 191. Frank, J. G. & Joel, G. S. (2001). Security Issues on the Internet. The CPA Journal. Retrieved March 20,2004, from http://www.nysscpa.org/cpajourna1/2001/1000/dept/d106401.htm Hayes, B. (2003). Conducting a Security Audit: An Introductory Overview. SecurityFocus. Retrieved April 22,2004, from http://www.frame4.com/php/modules.php?name=News&file=article&sid=514 Leinwand, A. & Conroy, K. F. (1996). Network Management; A Practical Perspective. 2nd Edition. Canada; Addison Wesley Longman, Inc. pp. 76. Michael, D. (2003). Security Analysis and Audit. A.P. Lawrence Home. Retrieved April 22,2004, from http://www.aplawrence.com/MDesrosiers/securityaudit.html National State Auditors Association and the U.S. General Accounting Office (2001).Management Planning Guide for Information Systems Security Auditing. Retrieved April 22, 2004, from http://www.gao.gov/special.pubs/mgmtpln.pdf Oppenheimer, P.(2001). Top-Down Network Design. United States of America; Cisco Press. pp. 250-251. Rutgers, The State University of New Jersey (2004). Risk Assessment. Retrieved April 22, 2004, from http://rusecure.rutgers.edu/sec_plan/risk.php. Sam, M. (2001). Logical Security of the City's Local Area Network. Audit Report. Retrieved March 20, 2004, from Http://talgov.com/citytlh/auditing/index.html Slade, R. (2002). Glossary of Communications, Computer, Data, and Information Security Terms. Version 0.09. Retrieved April 22,2004, from http://victoria.tc.ca/-int-grps/books/techrev/secgloss.htm. Stopa K. B. (2003). A Network Security Audit Methodology. GIAC Security Essentials Certification (GSEC). Practical Version 1.4, Option 1. Retrieved March 20, 2004, from http://www.giac.org/practical/GSEC/Kim_Stopa_GSEC.pdf. Sullivan, K. Kelley, K & McElveen, M. (2001). Network Audit Procedures. CVOC Technology Library Project. Retrieved March 20,2004, from http://isds.bus.lsu.edu/cvoc/Projects/TechLibrary/NetAudit/Alternative%20Comparison.htm. Tanenbaun, A. S.(1996). Computer network. United States of America; Prentice Hall.
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic TK5101-6720 Telecommunication
spellingShingle TK5101-6720 Telecommunication
Mohamad Fadli, Zolkipli
Network Security Management Audit at UUM Computer Centre
description An organization needs to evaluate its network security in order to measure accountability, confidentiality, integrity, authority and also its authenticity. The method that is commonly used for this purpose is by conducting an audit. Using the auditing method, this research attempts to evaluate the network security at the UUM Computer Centre. The purpose of this paper is to identify the network security deficiencies at UUM Computer Centre. Results from the network security audit will then be used to recommend solution to improve those loopholes. The selected audit method is based on the Information Protection and Security Division of University Computing Services (IP & SD UCS), from The State University of New Jersey.
format Thesis
qualification_name masters
qualification_level Master's degree
author Mohamad Fadli, Zolkipli
author_facet Mohamad Fadli, Zolkipli
author_sort Mohamad Fadli, Zolkipli
title Network Security Management Audit at UUM Computer Centre
title_short Network Security Management Audit at UUM Computer Centre
title_full Network Security Management Audit at UUM Computer Centre
title_fullStr Network Security Management Audit at UUM Computer Centre
title_full_unstemmed Network Security Management Audit at UUM Computer Centre
title_sort network security management audit at uum computer centre
granting_institution Universiti Utara Malaysia
granting_department Faculty of Information Technology
publishDate 2004
url https://etd.uum.edu.my/1311/1/MOHAMAD_FADLI_ZOLKIPLI.pdf
https://etd.uum.edu.my/1311/2/1.MOHAMAD_FADLI_ZOLKIPLI.pdf
_version_ 1747827118972076032