Development of an Improved Network Security System using Firewall for Securing Organisational Data
DOI:
https://doi.org/10.14738/tnc.85.9605Keywords:
Firewall, Internet, Network Security system, Organizational Data, Dual-Homed host firewall, Insecure Network, Packet Filtering, Proxy ServerAbstract
It is eminent that the Internet is far from being secure. Insecure networks have caused organizations to lose lots of money as a result of data loss or data corruption, and even worse, some organizations have also lost their reputation hence reduce the client’s confidence. Therefore, this research focused on the development of an improved network security system using a firewall that can secure both the internal and external network of an organization. The system was developed using both packet filtering and proxy server architectures to prevent unauthorized connection or access to the organization server or resources thereby reducing the risk of attacks to the network and loss of organizational data. The system was implemented using PHP and python programming languages and the backend was developed using MySQL as the database server; HTML, CSS, and JavaScript for the frontend layout. The implementation of this firewall system includes a monitoring admin interface from where most activities within the private network can be monitored and also this system can prevent or deny the unauthorized request of services either by an intruder from an external network or personnel within the network. Based on the findings of this study, the developed system is recommended for any organization that depends on computer networks for the running of their daily activities.
References
(2) Anton, V. U. (2012). Security Distributed Systems Using Patterns: A Survey, Computers and Security, 31(5), 681-703.
(3) Carnahan, L. J., and Wack, J. P. (2010). Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls”. URL: http://csrc.ncsl.nist.gov/nistpubs/800-10/. Retrieved 04/01/2020.
(4) Cheswick, W. R., Bellovin, S. M., and Rubin, A. D. (2013). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, Longman Publishing Co. Inc.
(5) Cheswick, W., Wily, H., Bellovin, S., and Addison-wesley, M. A. (2013). Firewalls and Internet Security; Repelling Reading, 33(41), 551-559.
(6) Creswell, J.W. (2018). Research Design Qualitative, Quantitative, and Mixed Method Approaches, 30(5), 35-47.
(7) Fraser, B. (2016). Networking Group. RFC 2196. Site Security Handbook.URL: http;//www.ietf.org/rfc/rfc2196.txt. Retrieved 06/01/2020.
(8) Gold, S. (2011). The Future of the Firewall. Network Security, 3496), 13-15.
(9) Harris, S. (2013). CISSP All in One Exam Guide, 6th edition. US: McGraw-Hill Companies. 61(6), 400-441.
(10) Herzog, A., and Shahmehri, N. (2007). Usability and Security of Personal Firewalls. In New Approaches for Security, Privacy and Trust in Complex Environments, Ed: Springer. 37-48.
(11) Howell, K. E. (2013). Introduction to the philosophy of methodology. 81(9), 33-55.
(12) Whitman, M. E., Mattord, H. J., Green, A., and Boston, M. A. (2012). Guide to Firewalls and VPNs, 3rd edition. Course Technology, Cengage Learning; 170(4), 150-200.