全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Enterprise Network Design and Security Optimization

DOI: 10.4236/oalib.1112489, PP. 1-17

Subject Areas: Computer and Network Security

Keywords: Security, Design, Firewalls, VPNs, DMZ

Full-Text   Cite this paper   Add to My Lib

Abstract

Enterprise networks are the backbone of an organization’s ability to communicate and share data. Information Technology Systems (ITS) extends beyond Computers and includes Phone Systems, Fax Machines, Internet of Things (IoT), applications, and other communication and data devices. A large company may have an extensive enterprise network that connects buildings around its headquarters campus with a high-speed network and other prerequisites, thereby making it highly vulnerable to threats and attacks. Enterprise network security is protection and precaution against confidentiality, integrity, availability, and accountability breaches. It entails protecting users and data against intruders by installing at several endpoints, encryption devices to sophisticate identification and authentication processes by cascading on the network, application, and transport layers of the open system interconnect (OSI) model architecture. This design will focus on the security challenges of both wired and wireless networks. Wireless Local Area Networks (WLAN) is more vulnerable to attacks because it transmits and receives data over the air and thus collectively combine data connectivity with ease of mobility [1]. It can be concluded that a properly set network having the right set of services such as Routing Protocols(RP), Access Lists(ACLs), Virtual Local Area Networks(VLANs), Firewalls, Virtual Private Networks (VPNs), Intrusion Detection Systems(IDS) all accurately configured and infused together have high-security performance for protecting and mitigating attacks carried out by both internal users and intruders on a network, providing about 99.9% protection against threats and vulnerabilities [2]. Virtual Private Network (VPN) provides a means by which remote computers communicate securely across a public Wide Area Network (WAN) such as the Internet. Firewalls are the main technology for access control between devices. All these devices are used to develop frameworks and policies which are enforced on the network to make it “airtight”. Given the huge relevance of communication and system security in today’s IT environment, this finding suggests that enterprise computer security remains an under studied research topic [3].

Cite this paper

Ikpe, K. and Ashigwuike, E. (2025). Enterprise Network Design and Security Optimization. Open Access Library Journal, 12, e2489. doi: http://dx.doi.org/10.4236/oalib.1112489.

References

[1]  Prastavana, M. and Praveen, S. (2016) Wireless Security Using Wi-Fi Protected Access 2 (WPA2). International Journal of Scientific Engineering and Applied Science, 2, 374-382.
[2]  Alhasan, A.J. and Surantha, N. (2021) Evaluation of Data Center Network Security Based on Next-Generation Firewall. International Journal of Advanced Computer Science and Applications, 12, 518-525. https://doi.org/10.14569/ijacsa.2021.0120958
[3]  Acuna, D. (2016) En-terprise Computer Security: A Literature Review. Journal of the Midwest Asso-ciation for Information Systems, 2016, 37-53. https://doi.org/10.17705/3jmwa.00016
[4]  Tharaka, S.C., Silva, R.L.C., Sharmila, S., Silva, S.U.I., et al. (2016) High Security Firewall: Prevent Unau-thorized Access Using Firewall Technologies. International Journal of Scientific and Research Publications, 6, 504-508.
[5]  Yasar, K. and Lutkevich, B. (2023) Malware Prevention, Detection and How Attacks. https://www.techtarget.com/searchsecurity/definition/malware
[6]  Nasir, A., Arshah, R.A. and Ab Hamid, M.R. (2017) Information Security Policy Com-pliance Behavior Based on Comprehensive Dimensions of Information Security Culture. Proceedings of the 2017 International Conference on Information Sys-tem and Data Mining, Charleston, 1-3 April 2017, 56-60. https://doi.org/10.1145/3077584.3077593
[7]  Panchakarla, B.P. (2019) Design and Implementation of Firewall to inspect Traffic in Encrypted VPN Tunnels. University Of Missouri-Kansas City.
[8]  Semwal, P. and Sharma, M.K. (2017) Comparative Study of Different Cryptographic Algorithms for Data Security in Cloud Computing. 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), Dehradun, 15-16 September 2017, 1-7. https://doi.org/10.1109/icaccaf.2017.8344738
[9]  Coonjah, I., Catherine, P.C. and Soyjaudah, K.M.S. (2015) Performance Evaluation and Analysis of Layer 3 Tunneling between OpenSSH and OpenVPN in a Wide Area Network Environment. 2015 International Conference on Computing, Communication and Security (ICCCS), Pointe aux Piments, 4-5 December 2015. https://doi.org/10.1109/cccs.2015.7374130
[10]  Lackovic, D. and Tomic, M. (2017) Performance Analysis of Virtualized VPN Endpoints. 2017 40th Inter-national Convention on Information and Communication Technology, Electron-ics and Microelectronics (MIPRO), Opatija, 22-26 May 2017, 466-471. https://doi.org/10.23919/mipro.2017.7973470
[11]  Luo, J. and Ji, Q. (2020) Password Acquisition and Traffic Decryption Based on L2TP/IPSec. 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, 28-31 October 2020, 1567-1571. https://doi.org/10.1109/icct50939.2020.9295700
[12]  St-Hilaire, W.A. (2021) Digital Risk Governance. University of Ottawa Canada.
[13]  Chandel, S. (2020) Securing a Network: How Effective Using Firewalls and VPNs Are? New York Institute of Technolo-gy.
[14]  https://www.packettracernetwork.com/labs/lab17-asa-ipsec-vpn.html
[15]  Cisco Technology Support (2023) https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html
[16]  Erlacher, F. and Dressler, F. (2020) On High-Speed Flow-Based Intrusion Detection using Snort-Compatible Signatures.

Full-Text


Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133