Development of an Improved Network Security System using Firewall for Securing Organisational Data

2020 ◽  
Vol 8 (5) ◽  
pp. 01-09
Author(s):  
Bassey Ele ◽  
Umoh, E. E. ◽  
Egete, D. O.

It is eminent that the Internet is far from being secure. Insecure networks have caused organizations to lose lots of money as a result of data loss or data corruption, and even worse, some organizations have also lost their reputation hence reduce the client’s confidence. Therefore, this research focused on the development of an improved network security system using a firewall that can secure both the internal and external network of an organization. The system was developed using both packet filtering and proxy server architectures to prevent unauthorized connection or access to the organization server or resources thereby reducing the risk of attacks to the network and loss of organizational data. The system was implemented using PHP and python programming languages and the backend was developed using MySQL as the database server; HTML, CSS, and JavaScript for the frontend layout. The implementation of this firewall system includes a monitoring admin interface from where most activities within the private network can be monitored and also this system can prevent or deny the unauthorized request of services either by an intruder from an external network or personnel within the network. Based on the findings of this study, the developed system is recommended for any organization that depends on computer networks for the running of their daily activities.

2014 ◽  
Vol 686 ◽  
pp. 453-457
Author(s):  
Yan Mei Zhang

The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.


2020 ◽  
Vol 19 (1) ◽  
pp. 1-8
Author(s):  
Randi Rizal ◽  
Ruuhwan Ruuhwan ◽  
Kelvin Ajie Nugraha

An important aspect of a network security system is maintaining data integrity and ensuring that it can be used by users safely. All types of attacks and countermeasures against network discovery attempts by unauthorized parties must be able to overcome efforts to protect network security systems. Firewall systems are used to solve this problem, but software-level attack errors cannot be protected by firewall systems. In this study, the implementation of port knocking and port blocking methods in the network was successfully carried out for data privacy issues. The port blocking method on the Mikrotik router permanently blocks the www port and the Winbox port using the services provided by the Mikrotik router. The port knocking method is more effective because it has rules for being able to enter the proxy server and access it remotely on the local network. The port knocking network implementation experiment applied to the Mikrotik router has enforced the winbox port, and www with 1-2-3 authentication flows with each authentication has a predetermined timeout time.


Author(s):  
A.H. Azni ◽  
Madihah Mohd Saudi ◽  
Azreen Azman ◽  
Emran Mohd Tamil ◽  
Mohd Yamani Idna Idris

Sign in / Sign up

Export Citation Format

Share Document