International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 54 | Number 2 | Year 2017 | Article Id. IJCTT-V54P122 | DOI : https://doi.org/10.14445/22312803/IJCTT-V54P122

Security Policy Monitoring System


Slim Toueiti, Amir Souissi, Karim Hassan

Citation :

Slim Toueiti, Amir Souissi, Karim Hassan, "Security Policy Monitoring System," International Journal of Computer Trends and Technology (IJCTT), vol. 54, no. 2, pp. 127-132, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V54P122

Abstract

The security of a computer system is the set of technical resources needed to prevent the unauthorized use, misuse, or alteration of that computer system. Several techniques and tools have been developed to ensure the security of a computer system, but a software tool is missing to monitor and follow the security policy. The idea behind this article is to set up a security policy monitoring system that uses existing hardware and software resources to ensure the proper functioning of a machine connected to the global network (Internet).

Keywords

Security; Security Policy; Monitoring..

References

[1]. JR Bettman, JW Payne, R Staelin, Cognitive considerations in designing effective labels for presenting risk information, Journal of Public Policy & Marketing – JSTOR [2]. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, Springer, Heidelberg (2006) [3]. O Berthold, H Federrath, S Köpsell, Web MIXes: A system for anonymous and unobservable Internet access, Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA [4]. SOPHOS: https://utm.trysophos.com/ [5]. FORTINET: https://www.fortinet.com/