Securing Enterprises from Malicious Attacks on their Networks

Securing Enterprises from Malicious Attacks on their Networks

Jameson Mbale, Manish Wadhwa
Copyright: © 2015 |Pages: 25
ISBN13: 9781466664739|ISBN10: 1466664738|EISBN13: 9781466664746
DOI: 10.4018/978-1-4666-6473-9.ch006
Cite Chapter Cite Chapter

MLA

Mbale, Jameson, and Manish Wadhwa. "Securing Enterprises from Malicious Attacks on their Networks." Technology, Innovation, and Enterprise Transformation, edited by Manish Wadhwa and Alan Harper, IGI Global, 2015, pp. 118-142. https://doi.org/10.4018/978-1-4666-6473-9.ch006

APA

Mbale, J. & Wadhwa, M. (2015). Securing Enterprises from Malicious Attacks on their Networks. In M. Wadhwa & A. Harper (Eds.), Technology, Innovation, and Enterprise Transformation (pp. 118-142). IGI Global. https://doi.org/10.4018/978-1-4666-6473-9.ch006

Chicago

Mbale, Jameson, and Manish Wadhwa. "Securing Enterprises from Malicious Attacks on their Networks." In Technology, Innovation, and Enterprise Transformation, edited by Manish Wadhwa and Alan Harper, 118-142. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6473-9.ch006

Export Reference

Mendeley
Favorite

Abstract

Routers interconnect networks of various enterprises, and the more secure the entry or exit points are made, the more robust the security of these enterprises is. These routers become the first direct targets and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists (ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme, routers are configured with Access Control Lists (ACL) that are used to filter in the intended packets and filter out the dangerous malicious packets from network traffic. This consolidates security deployment over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities, and other related secure measures. This can help network technicians working for various enterprises manage security at low costs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.