Implementing Secured Network for Tier 1 Organization
International Journal of Electronics and Communication Engineering |
© 2020 by SSRG - IJECE Journal |
Volume 7 Issue 4 |
Year of Publication : 2020 |
Authors : Ms. Siddhi Narendra Jadhav, Ms. Suruchi Sandip Shinde, Ms. Harshada Ramchandra Yedve, Mrs.S.V.Chougule |
How to Cite?
Ms. Siddhi Narendra Jadhav, Ms. Suruchi Sandip Shinde, Ms. Harshada Ramchandra Yedve, Mrs.S.V.Chougule, "Implementing Secured Network for Tier 1 Organization," SSRG International Journal of Electronics and Communication Engineering, vol. 7, no. 4, pp. 14-20, 2020. Crossref, https://doi.org/10.14445/23488549/IJECE-V7I4P104
Abstract:
In today's internet and data communication, security is a major concern to protect confidential data, privacy policies, and many more. Data integrity, confidentiality, and authenticity of sensitive information have become important aspects for organizations. While no network is immune to attacks, a stable and efficient network security system is essential to protecting organization data. A good network security system helps businesses reduce the risk of falling victim to data theft and sabotage. Attacks made on a network or wirelessly cannot be identified directly, so they are generally known as major attacks and harmful attacks. This paper discusses network security aspects of Tier-I organization and implementation of the same using two-stage firewalls. Two firewalls are implemented so that one is between a private network and a Demilitarized zone, and the other is between a demilitarized zone internet service provider. The network becomes perfectly secured so that if an attacker cracks firewall 1, it can stop at firewall 2; it is some filtration of unwanted things in the network.
Keywords:
Firewall, Internet Service Provider, Demilitarized zone, private network.
References:
[1] Pablo Gil, Member IEEE, Gabriel J. Garcia, Angel Delgado, Rosa M. Medina, Antonio Calderon, Patricia Marti Computer Science Research Institute University of Alicante San Vicente del Raspeig "Computer Networks Virtualization with GNS3," Vol 22, No July 2017.
[2] Aakanksha Chopra Assistant Professor (IT), "Security Issues of Firewall," International Journal of P2P Network Trends and Technology (IJPTT) – Volume 6 Issue 1 January to February 2016.
[3] Rahul Pareek, Journal Of Global Research In Computer Science. "Network Security: An Approach towards Secure Computing," Volume 2, No. 7, July 2011
[4] Mohan V. Pawar1, Maharashtra, "Network Security and Types of Attacks in Network," International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014) Procedia Computer Science 48 (2015) 503 – 506.
[5] Ramy K. Khalil, IJCSNS International Journal of Computer Science and Network Security, "A Study of Network Security Systems," VOL.10 No.6, June 2010.
[6] Shirley Radack "Managing Information Security Risk: Organization, Mission and Information System View," Volume 7, No 5, April 2016.
[7] Jeroen Merk, Merk, J. (2014) "The Rise of Tier 1 Firms in the Global Garment Industry: Challenges for Labour Rights Advocates," Oxford Development Studies, vol. 42 (2) pp. 277-295.
[8] Daniel Makupi, Nelson Masese, "Determining Information Security Maturity Level of an organization based on ISO 27001" SSRG International Journal of Computer Science and Engineering 6.7 (2019): 5-11.
[9] Mrs. V.Usha Bala, Dr.B.D.C.N.Prasad, "Steering the Enterprise's Information System Security Risks in Relation with Uncertainty (Information System, Risks)" SSRG International Journal of Computer Science and Engineering 5.2 (2018): 5-8.
[10] Binh Nguyen "Network Security and Firewall," A Linux Open Source Firewall Helsinki Metropolia University of Applied Science Bachelor of Engineering Information Technology Bachelor'sThesis Date 29 April 2016.
[11] Sourabh Shrimali M.Tech (Network Management & Information Security) School of Computer Science & IT Devi Ahilya Vishwavidyalaya, Indore, India "Demilitarized Zone: Network Architecture for Information Security," International Journal of
Computer Applications (0975 – 8887) Volume 174 – No.5, September 2017.
[12] Uchenna Cyril "ISPs' Service Quality and Customer Satisfaction in the Southern Region of Malaysia," 19th Australian Conference on Information System Service Quality and Customer Satisfaction 3-5 Dec 2008.
[13] www.gns3.com
[14] Behrouz A. Forouzan "TCP/IP Protocol suite Fourth Edition."