Research on System Structure of Mobile Internet Security Audit

Research on System Structure of Mobile Internet Security Audit

Xia-Meng Si
Copyright: © 2016 |Volume: 8 |Issue: 2 |Pages: 9
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781466690615|DOI: 10.4018/IJITN.2016040102
Cite Article Cite Article

MLA

Si, Xia-Meng. "Research on System Structure of Mobile Internet Security Audit." IJITN vol.8, no.2 2016: pp.12-20. http://doi.org/10.4018/IJITN.2016040102

APA

Si, X. (2016). Research on System Structure of Mobile Internet Security Audit. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 8(2), 12-20. http://doi.org/10.4018/IJITN.2016040102

Chicago

Si, Xia-Meng. "Research on System Structure of Mobile Internet Security Audit," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 8, no.2: 12-20. http://doi.org/10.4018/IJITN.2016040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

As the development of mobile internet bring convenient for people, the openness and variety of services make its security issues more complicated than those of traditional network. Firewall and intrusion detection focuses on external aggression, and cannot prevent revealing of internal information. As supplementary, security audit technology can monitor internal users' activity, forbid abnormal behavior of internal users. The author introduces related works about mobile internet security audit, comb through matured products on the market, and analyze current security status and architecture of mobile internet security. Based on the research results of traditional network security audit, the author provides a functional framework and universal model of mobile internet security auditing, as well as introduce an application scenario.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.