Enterprise networks are the backbone of an organization’s ability to communicate and share data. Information Technology Systems (ITS) extends beyond Computers and includes Phone Systems, Fax Machines, Internet of Things (IoT), applications, and other communication and data devices. A large company may have an extensive enterprise network that connects buildings around its headquarters campus with a high-speed network and other prerequisites, thereby making it highly vulnerable to threats and attacks. Enterprise network security is protection and precaution against confidentiality, integrity, availability, and accountability breaches. It entails protecting users and data against intruders by installing at several endpoints, encryption devices to sophisticate identification and authentication processes by cascading on the network, application, and transport layers of the open system interconnect (OSI) model architecture. This design will focus on the security challenges of both wired and wireless networks. Wireless Local Area Networks (WLAN) is more vulnerable to attacks because it transmits and receives data over the air and thus collectively combine data connectivity with ease of mobility [1]. It can be concluded that a properly set network having the right set of services such as Routing Protocols(RP), Access Lists(ACLs), Virtual Local Area Networks(VLANs), Firewalls, Virtual Private Networks (VPNs), Intrusion Detection Systems(IDS) all accurately configured and infused together have high-security performance for protecting and mitigating attacks carried out by both internal users and intruders on a network, providing about 99.9% protection against threats and vulnerabilities [2]. Virtual Private Network (VPN) provides a means by which remote computers communicate securely across a public Wide Area Network (WAN) such as the Internet. Firewalls are the main technology for access control between devices. All these devices are used to develop frameworks and policies which are enforced on the network to make it “airtight”. Given the huge relevance of communication and system security in today’s IT environment, this finding suggests that enterprise computer security remains an under studied research topic [3].
Cite this paper
Ikpe, K. and Ashigwuike, E. (2025). Enterprise Network Design and Security Optimization. Open Access Library Journal, 12, e2489. doi: http://dx.doi.org/10.4236/oalib.1112489.
Prastavana, M. and Praveen, S. (2016) Wireless Security Using Wi-Fi Protected Access 2 (WPA2). International Journal of Scientific Engineering and Applied Science, 2, 374-382.
Alhasan, A.J. and Surantha, N. (2021) Evaluation of Data Center Network Security Based on Next-Generation Firewall. International Journal of Advanced Computer Science and Applications, 12, 518-525. https://doi.org/10.14569/ijacsa.2021.0120958
Acuna, D. (2016) En-terprise Computer Security: A Literature Review. Journal of the Midwest Asso-ciation for Information Systems, 2016, 37-53. https://doi.org/10.17705/3jmwa.00016
Tharaka, S.C., Silva, R.L.C., Sharmila, S., Silva, S.U.I., et al. (2016) High Security Firewall: Prevent Unau-thorized Access Using Firewall Technologies. International Journal of Scientific and Research Publications, 6, 504-508.
Nasir, A., Arshah, R.A. and Ab Hamid, M.R. (2017) Information Security Policy Com-pliance Behavior Based on Comprehensive Dimensions of Information Security Culture. Proceedings of the 2017 International Conference on Information Sys-tem and Data Mining, Charleston, 1-3 April 2017, 56-60. https://doi.org/10.1145/3077584.3077593
Semwal, P. and Sharma, M.K. (2017) Comparative Study of Different Cryptographic Algorithms for Data Security in Cloud Computing. 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), Dehradun, 15-16 September 2017, 1-7. https://doi.org/10.1109/icaccaf.2017.8344738
Coonjah, I., Catherine, P.C. and Soyjaudah, K.M.S. (2015) Performance Evaluation and Analysis of Layer 3 Tunneling between OpenSSH and OpenVPN in a Wide Area Network Environment. 2015 International Conference on Computing, Communication and Security (ICCCS), Pointe aux Piments, 4-5 December 2015. https://doi.org/10.1109/cccs.2015.7374130
Lackovic, D. and Tomic, M. (2017) Performance Analysis of Virtualized VPN Endpoints. 2017 40th Inter-national Convention on Information and Communication Technology, Electron-ics and Microelectronics (MIPRO), Opatija, 22-26 May 2017, 466-471. https://doi.org/10.23919/mipro.2017.7973470
Luo, J. and Ji, Q. (2020) Password Acquisition and Traffic Decryption Based on L2TP/IPSec. 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, 28-31 October 2020, 1567-1571. https://doi.org/10.1109/icct50939.2020.9295700