By Topic

Research and design of security audit system for compliance

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jing Liu ; Engineering teach and practice training center, Tianjing Polytechnic University, Tianjin, China ; Xiaoni Wang ; Dongliang Jiao ; Chen Wang

Security audit plays an important role in information system, but currently there are various deficiencies in the security audit systems. This paper elaborates the concept of compliance audit, and then introduces the system architecture and components of a log-based network security audit system for compliance. In the end, the detailed design of key components and technologies used are emphasized. Application results indicate that this system achieves the compliance requirements and can effectively enhance the security of the system being audited.

Published in:

Information Technology in Medicine and Education (ITME), 2012 International Symposium on  (Volume:2 )

Date of Conference:

3-5 Aug. 2012