Network Security Management and Protection using UTM Firewall

Authors

  • Solanki PS Central Water and Power Research Station, Pune, India
  • PR Khatarkar Central Water and Power Research Station, Pune, India

DOI:

https://doi.org/10.26438/ijcse/v7i6.10551058

Keywords:

Network security, Network threats, UTM Firewall, ICT, Internet

Abstract

Information and Commutation Technology (ICT) is the most important strategic issue for any organization and in the age of digital industrialization, every establishment uses the ICT for running their business therefore they are more depended on network. Increasingly uses of ICT posing new security challenges. Network infrastructure is essential to enable the network for communication. All devices in network are equally important to run the network and in failure of any one device may have devastating effect on people, economy, government services and national security. In this hyper-connected world, protecting our network and data from unauthorized access are big challenge. Process of protecting network infrastructures and data from external destructive threats and intrusion is known as network security. Network security for every organization must be consider as essential for functioning of network system and must be dealt with proactive and timely manner. For the above said purposes it is essential to have a dedicated network security system which can perform security function viz. firewall, intrusion detection and prevention, antivirus etc. In this paper we are discussing about the implementation of Unified Threat Management (UTM) Firewall system for network security management and protecting the Network for CWPRS Local Area Network (CLAN). The UTM Firewall has been successfully implemented at CWPRS for indentifying and protecting the Network from internal and external threats.

References

[1] Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman, “Building Internet Firewalls”, Second Edition, June 2000, ISBN: 1-56592-871-7, page no. 1.

[2] Thaier Hayajneh, Bassam J. Mohd , Awni Itradat, and Ahmad Nahar Quttoum “Performance and Information Security Evaluation with Firewalls”, International Journal of Security and Its Applications,Vol.7, No.6 (2013), pp.355-372.

[3] https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained

[4] http:cwprs.gov.in website

[5] Cert-In, Information Security Policy for protection of critical information and infrastructure CERT-in/NISAP/01, issue 01, May 2006.

Downloads

Published

2019-06-30
CITATION
DOI: 10.26438/ijcse/v7i6.10551058
Published: 2019-06-30

How to Cite

[1]
P. S. Solanki and K. P. R., “Network Security Management and Protection using UTM Firewall”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 1055–1058, Jun. 2019.

Issue

Section

Research Article