Unified threat management system approach for securing sme's network infrastructure

Saqib Ali, Maitham H.Al Lawati, Syed J. Naqvi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.

Original languageEnglish
Title of host publicationProceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012
Pages170-176
Number of pages7
DOIs
Publication statusPublished - 2012
Event9th IEEE International Conference on E-Business Engineering, ICEBE 2012, Including, SOAIC 2012, EM2I 2012, SOKMBI 2012, ASOC 2012 - Hangzhou, China
Duration: Sep 9 2012Sep 11 2012

Other

Other9th IEEE International Conference on E-Business Engineering, ICEBE 2012, Including, SOAIC 2012, EM2I 2012, SOKMBI 2012, ASOC 2012
CountryChina
CityHangzhou
Period9/9/129/11/12

    Fingerprint

Keywords

  • Network infrastructure
  • Network security
  • SME's
  • Unified Threat Management (UTM)

ASJC Scopus subject areas

  • Management of Technology and Innovation
  • Economics, Econometrics and Finance (miscellaneous)

Cite this

Ali, S., Lawati, M. H. A., & Naqvi, S. J. (2012). Unified threat management system approach for securing sme's network infrastructure. In Proceedings - 9th IEEE International Conference on E-Business Engineering, ICEBE 2012 (pp. 170-176). [6468235] https://doi.org/10.1109/ICEBE.2012.36