Reference Hub1
Network Security and Firewall Technology: A Step to Safety of National IT Vision

Network Security and Firewall Technology: A Step to Safety of National IT Vision

Afolayan A. Obiniyi, Ezugwu E. Absalom, Mohammed Dikko
Copyright: © 2011 |Volume: 2 |Issue: 2 |Pages: 21
ISSN: 1947-9050|EISSN: 1947-9069|EISBN13: 9781613506424|DOI: 10.4018/jdtis.2011040103
Cite Article Cite Article

MLA

Obiniyi, Afolayan A., et al. "Network Security and Firewall Technology: A Step to Safety of National IT Vision." IJDTIS vol.2, no.2 2011: pp.40-60. http://doi.org/10.4018/jdtis.2011040103

APA

Obiniyi, A. A., Absalom, E. E., & Dikko, M. (2011). Network Security and Firewall Technology: A Step to Safety of National IT Vision. International Journal of Dependable and Trustworthy Information Systems (IJDTIS), 2(2), 40-60. http://doi.org/10.4018/jdtis.2011040103

Chicago

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology: A Step to Safety of National IT Vision," International Journal of Dependable and Trustworthy Information Systems (IJDTIS) 2, no.2: 40-60. http://doi.org/10.4018/jdtis.2011040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.