An effective modified security auditing tool (SAT)

被引:0
|
作者
Mohamed, AB [1 ]
机构
[1] Arab Acad Sci & Technol, Coll Engn & Technol, Dept Comp Engn, Alexandria, Egypt
关键词
Security Administration Tool (SAT); security auditing (SA); vulnerability;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security audit is an important trend in computer security field. The computer system vendors introduce secure systems in the market;and mention how these systems are secure and how they provide multiple layers of security. The fact is that we have many bugs and vulnerable points in various systems due to imperfect testing from vendor's side or imperfect administration from system administrator side. A security audit plays an important role in determining any exploitable weaknesses that put the data at risk. In this work we design and implement a security administration tool for auditing the latest vulnerabilities and weak points in three of the most common operating systems ( Windows 95/98/NT/2000, Linux, and Solaris). This tool, called SAT (Security Administration Tool), tests and detects the weakness and security holes in any computer network system, and generates a comprehensive report that contains the analysis of the scans, the ranking of the risks found, and the detailed recommendations for fixing potential vulnerabilities. A new important feature of SAT is that it tests and recommends solutions for the latest vulnerabilities for any of the aforementioned operating systems.
引用
收藏
页码:37 / 41
页数:5
相关论文
共 50 条
  • [1] QUEST - A SECURITY AUDITING TOOL
    KAPILOW, SA
    CHEREPOV, M
    [J]. AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 65 - 71
  • [2] ENVIRONMENTAL AUDITING - A TIMELY AND EFFECTIVE TOOL
    MACINTYRE, ST
    [J]. JOURNAL OF THE AIR POLLUTION CONTROL ASSOCIATION, 1983, 33 (09): : 909 - 913
  • [3] Development of an Effective Auditing Tool to Assess Bedside Transfusions
    Muck, C. A.
    Gott, M. A.
    Butch, S. H.
    [J]. TRANSFUSION, 2012, 52 : 260A - 260A
  • [4] A rule-based security auditing tool for software vulnerability detection
    Lee, Moohun
    Cho, Sunghoon
    Jang, Changbok
    Park, Heeyong
    Choi, Euiin
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 505 - 512
  • [5] Ascertaining Security in Online Reputation Systems Using Rate Auditing Tool (RAT)
    Dhivyalakshmi, D.
    Kalaivani, K.
    Tamilarasi, V
    Bhavani, P.
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [6] KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security
    Li, Dong
    Zhang, Zhaonian
    Liao, Weiyuan
    Xu, Zhiwei
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 427 - 432
  • [7] Security and auditing of VPN
    Boukari, N
    Aljane, A
    [J]. THIRD INTERNATIONAL WORKSHOP ON SERVICES IN DISTRIBUTED AND NETWORKED ENVIRONMENTS, PROCEEDINGS, 1996, : 132 - 138
  • [8] Security Auditing in the Fog
    Parkinson, Simon
    Qin, Yongrui
    Khan, Saad
    Vallati, Mauro
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [9] Modified tool structures for effective cutting
    Ostasevicius, V.
    Jurenas, V.
    Juskevicius, A.
    [J]. MECHANIKA, 2014, (02): : 171 - 176
  • [10] Auditing the IT security function
    Osborne, K
    [J]. COMPUTERS & SECURITY, 1998, 17 (01) : 34 - 41