Network Security Management and Protection using UTM Firewall
DOI:
https://doi.org/10.26438/ijcse/v7i6.10551058Keywords:
Network security, Network threats, UTM Firewall, ICT, InternetAbstract
Information and Commutation Technology (ICT) is the most important strategic issue for any organization and in the age of digital industrialization, every establishment uses the ICT for running their business therefore they are more depended on network. Increasingly uses of ICT posing new security challenges. Network infrastructure is essential to enable the network for communication. All devices in network are equally important to run the network and in failure of any one device may have devastating effect on people, economy, government services and national security. In this hyper-connected world, protecting our network and data from unauthorized access are big challenge. Process of protecting network infrastructures and data from external destructive threats and intrusion is known as network security. Network security for every organization must be consider as essential for functioning of network system and must be dealt with proactive and timely manner. For the above said purposes it is essential to have a dedicated network security system which can perform security function viz. firewall, intrusion detection and prevention, antivirus etc. In this paper we are discussing about the implementation of Unified Threat Management (UTM) Firewall system for network security management and protecting the Network for CWPRS Local Area Network (CLAN). The UTM Firewall has been successfully implemented at CWPRS for indentifying and protecting the Network from internal and external threats.
References
[1] Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman, “Building Internet Firewalls”, Second Edition, June 2000, ISBN: 1-56592-871-7, page no. 1.
[2] Thaier Hayajneh, Bassam J. Mohd , Awni Itradat, and Ahmad Nahar Quttoum “Performance and Information Security Evaluation with Firewalls”, International Journal of Security and Its Applications,Vol.7, No.6 (2013), pp.355-372.
[3] https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained
[4] http:cwprs.gov.in website
[5] Cert-In, Information Security Policy for protection of critical information and infrastructure CERT-in/NISAP/01, issue 01, May 2006.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
