Research Article | Open Access | Download PDF
Volume 54 | Number 2 | Year 2017 | Article Id. IJCTT-V54P122 | DOI : https://doi.org/10.14445/22312803/IJCTT-V54P122
Security Policy Monitoring System
Slim Toueiti, Amir Souissi, Karim Hassan
Citation :
Slim Toueiti, Amir Souissi, Karim Hassan, "Security Policy Monitoring System," International Journal of Computer Trends and Technology (IJCTT), vol. 54, no. 2, pp. 127-132, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V54P122
Abstract
The security of a computer system is the set of technical resources needed to prevent the unauthorized use, misuse, or alteration of that computer system. Several techniques and tools have been developed to ensure the security of a computer system, but a software tool is missing to monitor and follow the security policy. The idea behind this article is to set up a security policy monitoring system that uses existing hardware and software resources to ensure the proper functioning of a machine connected to the global network (Internet).
Keywords
Security; Security Policy; Monitoring..
References
[1]. JR Bettman, JW Payne, R Staelin, Cognitive considerations in designing effective labels for presenting risk information, Journal of Public Policy & Marketing – JSTOR [2]. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, Springer, Heidelberg (2006) [3]. O Berthold, H Federrath, S Köpsell, Web MIXes: A system for anonymous and unobservable Internet access, Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA [4]. SOPHOS: https://utm.trysophos.com/ [5]. FORTINET: https://www.fortinet.com/