Network Security Management Audit at UUM Computer Centre
An organization needs to evaluate its network security in order to measure accountability, confidentiality, integrity, authority and also its authenticity. The method that is commonly used for this purpose is by conducting an audit. Using the auditing method, this research attempts to evaluate the...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2004
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/1311/1/MOHAMAD_FADLI_ZOLKIPLI.pdf https://etd.uum.edu.my/1311/2/1.MOHAMAD_FADLI_ZOLKIPLI.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.1311 |
---|---|
record_format |
uketd_dc |
spelling |
my-uum-etd.13112013-07-24T12:11:24Z Network Security Management Audit at UUM Computer Centre 2004 Mohamad Fadli, Zolkipli Faculty of Information Technology Faculty of Information Technology TK5101-6720 Telecommunication An organization needs to evaluate its network security in order to measure accountability, confidentiality, integrity, authority and also its authenticity. The method that is commonly used for this purpose is by conducting an audit. Using the auditing method, this research attempts to evaluate the network security at the UUM Computer Centre. The purpose of this paper is to identify the network security deficiencies at UUM Computer Centre. Results from the network security audit will then be used to recommend solution to improve those loopholes. The selected audit method is based on the Information Protection and Security Division of University Computing Services (IP & SD UCS), from The State University of New Jersey. 2004 Thesis https://etd.uum.edu.my/1311/ https://etd.uum.edu.my/1311/1/MOHAMAD_FADLI_ZOLKIPLI.pdf application/pdf eng validuser https://etd.uum.edu.my/1311/2/1.MOHAMAD_FADLI_ZOLKIPLI.pdf application/pdf eng public masters masters Universiti Utara Malaysia Baltatu, M. Lioy, A. Maino, F & Mazzocchi, D. (2000). Security issues in control,management and routing protocols. Computer network. Vol.34. pp.881-894. BICSI (2001). Chapter 8 Network Security; Network Design Reference Manual. 4th Edition. Cisco System (2001). A Beginner's Guide to Network Security. United States of America; Cisco Press. Retrieved August 24,2003, from http://www.pcconnection.com Desrosiers, M. (2003). Security Analysis and Audit. A.P. Lawrence Home. Retrieved March 20, 2004, from http://www.aplawrence.com/MDesrosiers/securiyaudit.html Federal Information Processing Standards (1994). Specifications for Guideline for The Analysis Local Area Network Security. Federal Information Processing Standards Publication 191. Frank, J. G. & Joel, G. S. (2001). Security Issues on the Internet. The CPA Journal. Retrieved March 20,2004, from http://www.nysscpa.org/cpajourna1/2001/1000/dept/d106401.htm Hayes, B. (2003). Conducting a Security Audit: An Introductory Overview. SecurityFocus. Retrieved April 22,2004, from http://www.frame4.com/php/modules.php?name=News&file=article&sid=514 Leinwand, A. & Conroy, K. F. (1996). Network Management; A Practical Perspective. 2nd Edition. Canada; Addison Wesley Longman, Inc. pp. 76. Michael, D. (2003). Security Analysis and Audit. A.P. Lawrence Home. Retrieved April 22,2004, from http://www.aplawrence.com/MDesrosiers/securityaudit.html National State Auditors Association and the U.S. General Accounting Office (2001).Management Planning Guide for Information Systems Security Auditing. Retrieved April 22, 2004, from http://www.gao.gov/special.pubs/mgmtpln.pdf Oppenheimer, P.(2001). Top-Down Network Design. United States of America; Cisco Press. pp. 250-251. Rutgers, The State University of New Jersey (2004). Risk Assessment. Retrieved April 22, 2004, from http://rusecure.rutgers.edu/sec_plan/risk.php. Sam, M. (2001). Logical Security of the City's Local Area Network. Audit Report. Retrieved March 20, 2004, from Http://talgov.com/citytlh/auditing/index.html Slade, R. (2002). Glossary of Communications, Computer, Data, and Information Security Terms. Version 0.09. Retrieved April 22,2004, from http://victoria.tc.ca/-int-grps/books/techrev/secgloss.htm. Stopa K. B. (2003). A Network Security Audit Methodology. GIAC Security Essentials Certification (GSEC). Practical Version 1.4, Option 1. Retrieved March 20, 2004, from http://www.giac.org/practical/GSEC/Kim_Stopa_GSEC.pdf. Sullivan, K. Kelley, K & McElveen, M. (2001). Network Audit Procedures. CVOC Technology Library Project. Retrieved March 20,2004, from http://isds.bus.lsu.edu/cvoc/Projects/TechLibrary/NetAudit/Alternative%20Comparison.htm. Tanenbaun, A. S.(1996). Computer network. United States of America; Prentice Hall. |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
TK5101-6720 Telecommunication |
spellingShingle |
TK5101-6720 Telecommunication Mohamad Fadli, Zolkipli Network Security Management Audit at UUM Computer Centre |
description |
An organization needs to evaluate its network security in order to measure accountability, confidentiality, integrity, authority and also its authenticity. The method that is commonly used for this purpose is by conducting an audit. Using the auditing method, this research attempts to evaluate the network security at the UUM Computer Centre. The purpose of this paper is to identify the network security deficiencies at UUM Computer Centre. Results from the network security audit will then be used to recommend solution to improve those loopholes. The selected audit method is based on the Information Protection and Security Division of University Computing Services (IP & SD UCS), from The State University of New Jersey. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Mohamad Fadli, Zolkipli |
author_facet |
Mohamad Fadli, Zolkipli |
author_sort |
Mohamad Fadli, Zolkipli |
title |
Network Security Management Audit at UUM Computer Centre
|
title_short |
Network Security Management Audit at UUM Computer Centre
|
title_full |
Network Security Management Audit at UUM Computer Centre
|
title_fullStr |
Network Security Management Audit at UUM Computer Centre
|
title_full_unstemmed |
Network Security Management Audit at UUM Computer Centre
|
title_sort |
network security management audit at uum computer centre |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Faculty of Information Technology |
publishDate |
2004 |
url |
https://etd.uum.edu.my/1311/1/MOHAMAD_FADLI_ZOLKIPLI.pdf https://etd.uum.edu.my/1311/2/1.MOHAMAD_FADLI_ZOLKIPLI.pdf |
_version_ |
1747827118972076032 |