A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs

The tremendous growth of the Internet, and particularly the World Wide Web (The Web) on 1989, has led to mass usage of networking. Organization regardless of government or private sector depends on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers...

Full description

Saved in:
Bibliographic Details
Main Author: Fara, Jamal
Format: Thesis
Language:eng
eng
Published: 2006
Subjects:
Online Access:https://etd.uum.edu.my/1835/1/Fara_binti_Jamal-A_proposed_framework_for_network_security_audit_trail_for_....pdf
https://etd.uum.edu.my/1835/2/Fara_binti_Jamal-A_proposed_framework_for_network_security_audit_trail_for_....pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.1835
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
topic TK5101-6720 Telecommunication
spellingShingle TK5101-6720 Telecommunication
Fara, Jamal
A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
description The tremendous growth of the Internet, and particularly the World Wide Web (The Web) on 1989, has led to mass usage of networking. Organization regardless of government or private sector depends on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers emerge align with the improvement of network. Many organization face problems on their network regardless of Local or Wide area network. Deployment of security equipments to protect the network is useless if the organization cannot track the root of the security problems. This can actually be done by conducting a network security audit. It is the best way to understand the organization security stand and the problem involve with the network. It depends on the organization weather to use the framework design by other researcher or customize their own framework in order to conduct network security audit in the organization.
format Thesis
qualification_name masters
qualification_level Master's degree
author Fara, Jamal
author_facet Fara, Jamal
author_sort Fara, Jamal
title A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
title_short A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
title_full A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
title_fullStr A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
title_full_unstemmed A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
title_sort proposed framework for network security audit trail for ministry of domestic trade & consumer affairs
granting_institution Universiti Utara Malaysia
granting_department Centre for Graduate Studies
publishDate 2006
url https://etd.uum.edu.my/1835/1/Fara_binti_Jamal-A_proposed_framework_for_network_security_audit_trail_for_....pdf
https://etd.uum.edu.my/1835/2/Fara_binti_Jamal-A_proposed_framework_for_network_security_audit_trail_for_....pdf
_version_ 1747827214673510400
spelling my-uum-etd.18352013-07-24T12:13:20Z A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs 2006 Fara, Jamal Centre for Graduate Studies Centre for Graduate Studies TK5101-6720 Telecommunication The tremendous growth of the Internet, and particularly the World Wide Web (The Web) on 1989, has led to mass usage of networking. Organization regardless of government or private sector depends on their network to run the business. Computer threats such as virus, worms and attack like DDOS, hackers emerge align with the improvement of network. Many organization face problems on their network regardless of Local or Wide area network. Deployment of security equipments to protect the network is useless if the organization cannot track the root of the security problems. This can actually be done by conducting a network security audit. It is the best way to understand the organization security stand and the problem involve with the network. It depends on the organization weather to use the framework design by other researcher or customize their own framework in order to conduct network security audit in the organization. 2006 Thesis https://etd.uum.edu.my/1835/ https://etd.uum.edu.my/1835/1/Fara_binti_Jamal-A_proposed_framework_for_network_security_audit_trail_for_....pdf application/pdf eng validuser https://etd.uum.edu.my/1835/2/Fara_binti_Jamal-A_proposed_framework_for_network_security_audit_trail_for_....pdf application/pdf eng public masters masters Universiti Utara Malaysia Adani P. (15 August 2006). Developing a RCM framework ti-om an Implementation's perspective. IT Asia Congress Incrementation , Astro. Computer security institute, (2002). Cyber crime bleeds U.S. corporations, survey shows; financial losses from attacks climb for third year in a row. Retrieved June 14,2006 from http://www.gocsi.com/press/2020407.jhtml:jsessionid=WR51SWRTHUIGOSNDLOSKHSCJUNN2JVN?_ N DLOSKHSCJUNN2JVN?_requestid=23180 Baharin N.Md Din, K.. Jamaludin. 7 . and Md Tahir, M. Third party security audit procedure for network environment; Telecomunication Technology,2003.Pages(s)"26-30 Budgen, P.J .Why risk analysis? risk Analysis methods and Tools, IEE Colloquium on 3 Jun 1992 Page(s):2/l-2/4. Fallara, P Disaster recovery planning..: Potentials, IEEE Volume22, Issue 5, Dec 2003-Jan 2004 Page(s): 42-44 Digital Object identifier 0.1109/MP.2004.1301248 IEEE JNL. Gray, T. (2002). Network security credo. Retrieved June 14, 2006 from http://staff.washington.edu/gray_papers/credo Hayes, B. (2003). Conducting a security audit: An introductory overview Retrieved June 12, 2006 from www.securityfacus.com/infocus/1697 Info-Tech research group. Security Auditing: An eight Steps guide. retrieved June 13.2006 Kurniawan D. (14 August 2006). Hon Secure Are You, IT Asia Congress Presentation.fortinet. Le Grand. C. H. (2005). Software Security Assurance: A framework for software vulnerability management and audit Lo, E.C. and Marchand, M Security audit: a case study [information systems],. Electrical and Computer Engineering. 2004. Canadian Conference on Volume 1 ,2-5 May 2004 Pagc(s): 193-196 Vol.1 Martin, K. (2005). Complexity kills innovation. Kctricvcd Junc 12, 2006 Michael , M. J. (2005). Router Expert: Why you need a networks. Mitnick . K. D. , & Simon W. L. (2005). The art of intrusion: The real stories behind the exploits of hackers, intruders & deceivers, John Wiley & Sons. Ounce Labs Inc January (2005) , A framework for software vulnerability management and audit White paper. Retrieved July 2006 from http://www.knowledgestrom.com/share/write/collateral/WTP/51265_19677-51585-SoftwareSecurityAssuranceFramework.pdf?ksi=1279585&ksc=1249753632. Prolexic Technologies. Inc. (2004). Distributed Denial of Service Attacks. White paper of Prolexic Technology, Inc., 04:2004. Retrieved Sun 10, 2006. Sehncier, H. (2000). Secrets and Lies: Digital security in a networked world. John Wiley & Sons. Tan J.(14 August 2006) Fraud & Cyber-Terrorism, Tapping on essential security measure to protect your enterprise. IT Asia congress Presentation, Extol. Wikipedia. Primary Domain Controller. Retrieved June 14, 2006 from http://en.wikipedia.org/wiki/primary domain controller. Wikipedia. Operating System, retrieved June 14,2006 from http://en.wikipedia.org/wiki/operating system.