Unified threat management system approach for securing sme's network infrastructure

Saqib Ali, Maitham H.Al Lawati, Syed J. Naqvi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.

Original languageEnglish
Title of host publicationProceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012
Pages170-176
Number of pages7
DOIs
Publication statusPublished - 2012
Event9th IEEE International Conference on E-Business Engineering, ICEBE 2012, Including, SOAIC 2012, EM2I 2012, SOKMBI 2012, ASOC 2012 - Hangzhou, China
Duration: Sep 9 2012Sep 11 2012

Other

Other9th IEEE International Conference on E-Business Engineering, ICEBE 2012, Including, SOAIC 2012, EM2I 2012, SOKMBI 2012, ASOC 2012
CountryChina
CityHangzhou
Period9/9/129/11/12

Fingerprint

Industry
Network security
Information technology
Information systems
Switches
Threat
Management system
Systems approach
Monitoring
Expertise
Small and medium-sized enterprises
Business process
Integral
Resources
Financial resources
Business organization
Methodology
Integrated

Keywords

  • Network infrastructure
  • Network security
  • SME's
  • Unified Threat Management (UTM)

ASJC Scopus subject areas

  • Management of Technology and Innovation
  • Economics, Econometrics and Finance (miscellaneous)

Cite this

Ali, S., Lawati, M. H. A., & Naqvi, S. J. (2012). Unified threat management system approach for securing sme's network infrastructure. In Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012 (pp. 170-176). [6468235] https://doi.org/10.1109/ICEBE.2012.36

Unified threat management system approach for securing sme's network infrastructure. / Ali, Saqib; Lawati, Maitham H.Al; Naqvi, Syed J.

Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012. 2012. p. 170-176 6468235.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ali, S, Lawati, MHA & Naqvi, SJ 2012, Unified threat management system approach for securing sme's network infrastructure. in Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012., 6468235, pp. 170-176, 9th IEEE International Conference on E-Business Engineering, ICEBE 2012, Including, SOAIC 2012, EM2I 2012, SOKMBI 2012, ASOC 2012, Hangzhou, China, 9/9/12. https://doi.org/10.1109/ICEBE.2012.36
Ali S, Lawati MHA, Naqvi SJ. Unified threat management system approach for securing sme's network infrastructure. In Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012. 2012. p. 170-176. 6468235 https://doi.org/10.1109/ICEBE.2012.36
Ali, Saqib ; Lawati, Maitham H.Al ; Naqvi, Syed J. / Unified threat management system approach for securing sme's network infrastructure. Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012. 2012. pp. 170-176
@inproceedings{1a0b3ecc8a4147c9afe7b6c81b068018,
title = "Unified threat management system approach for securing sme's network infrastructure",
abstract = "For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SME{\^a}s), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SME{\^a}s network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.",
keywords = "Network infrastructure, Network security, SME's, Unified Threat Management (UTM)",
author = "Saqib Ali and Lawati, {Maitham H.Al} and Naqvi, {Syed J.}",
year = "2012",
doi = "10.1109/ICEBE.2012.36",
language = "English",
isbn = "9780769548098",
pages = "170--176",
booktitle = "Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012",

}

TY - GEN

T1 - Unified threat management system approach for securing sme's network infrastructure

AU - Ali, Saqib

AU - Lawati, Maitham H.Al

AU - Naqvi, Syed J.

PY - 2012

Y1 - 2012

N2 - For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.

AB - For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.

KW - Network infrastructure

KW - Network security

KW - SME's

KW - Unified Threat Management (UTM)

UR - http://www.scopus.com/inward/record.url?scp=84875486520&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84875486520&partnerID=8YFLogxK

U2 - 10.1109/ICEBE.2012.36

DO - 10.1109/ICEBE.2012.36

M3 - Conference contribution

SN - 9780769548098

SP - 170

EP - 176

BT - Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012

ER -