Network Security Management and Protection using UTM Firewall
Pratap Singh Solanki1 , P. R. Khatarkar2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-6 , Page no. 1055-1058, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10551058
Online published on Jun 30, 2019
Copyright © Pratap Singh Solanki, P. R. Khatarkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Pratap Singh Solanki, P. R. Khatarkar, “Network Security Management and Protection using UTM Firewall,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1055-1058, 2019.
MLA Style Citation: Pratap Singh Solanki, P. R. Khatarkar "Network Security Management and Protection using UTM Firewall." International Journal of Computer Sciences and Engineering 7.6 (2019): 1055-1058.
APA Style Citation: Pratap Singh Solanki, P. R. Khatarkar, (2019). Network Security Management and Protection using UTM Firewall. International Journal of Computer Sciences and Engineering, 7(6), 1055-1058.
BibTex Style Citation:
@article{Solanki_2019,
author = {Pratap Singh Solanki, P. R. Khatarkar},
title = {Network Security Management and Protection using UTM Firewall},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {1055-1058},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4680},
doi = {https://doi.org/10.26438/ijcse/v7i6.10551058}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.10551058}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4680
TI - Network Security Management and Protection using UTM Firewall
T2 - International Journal of Computer Sciences and Engineering
AU - Pratap Singh Solanki, P. R. Khatarkar
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 1055-1058
IS - 6
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
384 | 340 downloads | 170 downloads |
Abstract
Information and Commutation Technology (ICT) is the most important strategic issue for any organization and in the age of digital industrialization, every establishment uses the ICT for running their business therefore they are more depended on network. Increasingly uses of ICT posing new security challenges. Network infrastructure is essential to enable the network for communication. All devices in network are equally important to run the network and in failure of any one device may have devastating effect on people, economy, government services and national security. In this hyper-connected world, protecting our network and data from unauthorized access are big challenge. Process of protecting network infrastructures and data from external destructive threats and intrusion is known as network security. Network security for every organization must be consider as essential for functioning of network system and must be dealt with proactive and timely manner. For the above said purposes it is essential to have a dedicated network security system which can perform security function viz. firewall, intrusion detection and prevention, antivirus etc. In this paper we are discussing about the implementation of Unified Threat Management (UTM) Firewall system for network security management and protecting the Network for CWPRS Local Area Network (CLAN). The UTM Firewall has been successfully implemented at CWPRS for indentifying and protecting the Network from internal and external threats.
Key-Words / Index Term
Network security, Network threats, UTM Firewall, ICT, Internet
References
[1] Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman, “Building Internet Firewalls”, Second Edition, June 2000, ISBN: 1-56592-871-7, page no. 1.
[2] Thaier Hayajneh, Bassam J. Mohd , Awni Itradat, and Ahmad Nahar Quttoum “Performance and Information Security Evaluation with Firewalls”, International Journal of Security and Its Applications,Vol.7, No.6 (2013), pp.355-372.
[3] https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained
[4] http:cwprs.gov.in website
[5] Cert-In, Information Security Policy for protection of critical information and infrastructure CERT-in/NISAP/01, issue 01, May 2006