Home > Archives  > Abstract

Exploration and Implementation of Computer System Security Management System

Author :
  • Isyaku Uba Haruna
  • Ang Ching Wen
Abstract
Most system security policies for computers are written relatively loosely. This is designed in many respects to provide easy access to all the features of the computer network. However, without the need to access many of the network features, so much leeway gives users the ability to perform functions that might damage the infrastructure or have access to information they have no necessary to look at. The intrusion prevention mechanisms, firewalls, and other protective equipment ensure the secure functioning of the network, but with the increasingly widespread use of networks, malware, hackers, and other security accidents, these security devices can deliver tens of thousands of alerts in a very small time, rendering it impossible for network management staff to locate valuable information. With this in mind, this paper deals a look at computer system security. This paper deals with computer misuse and detection, and the exploration and implementation of a security management system. Detection of misuse includes at least two elements. Audit elimination and profiling capacity are these. Huge files can be set up when audit functions are allowed in the operating system. The automatic audit features can easily search audit files by setting staff user profiles, check for usage that falls below what is determined to be usual, alert administrators, and remove old audit data.
Keywords : A computer network, system security, safety management
Volume 4 | Issue 4
DOI :