Security Policy Monitoring System

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-54 Number-3
Year of Publication : 2017
Authors : Slim Toueiti, Amir Souissi, Karim Hassan
DOI :  10.14445/22312803/IJCTT-V54P122

MLA

Slim Toueiti, Amir Souissi, Karim Hassan "Security Policy Monitoring System". International Journal of Computer Trends and Technology (IJCTT) V54(3):127-132, December 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
The security of a computer system is the set of technical resources needed to prevent the unauthorized use, misuse, or alteration of that computer system. Several techniques and tools have been developed to ensure the security of a computer system, but a software tool is missing to monitor and follow the security policy. The idea behind this article is to set up a security policy monitoring system that uses existing hardware and software resources to ensure the proper functioning of a machine connected to the global network (Internet).

References
[1]. JR Bettman, JW Payne, R Staelin, Cognitive considerations in designing effective labels for presenting risk information, Journal of Public Policy & Marketing – JSTOR [2]. Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, Springer, Heidelberg (2006) [3]. O Berthold, H Federrath, S Köpsell, Web MIXes: A system for anonymous and unobservable Internet access, Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA [4]. SOPHOS: https://utm.trysophos.com/ [5]. FORTINET: https://www.fortinet.com/

Keywords
Security; Security Policy; Monitoring..