Title :
Unified Threat Management System Approach for Securing SME´s Network Infrastructure
Author :
Ali, Shady ; Lawati, M.H.A. ; Naqvi, S.J.
Author_Institution :
Sultan Qaboos Univ., Al Khod, Oman
Abstract :
For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.
Keywords :
computer network security; information systems; small-to-medium enterprises; SME network infrastructure security; UTM; business organizations; business process; confidential information; financial resources; information systems; information technologies; network infrastructure threats; network security; secure computing services; sensitive information; small to medium enterprises; technical expertise; technical resources; unified threat management system approach; vital business information; zone based controlling system; zone based monitoring system; Computer hacking; Computers; Internet; Organizations; Switches; Network infrastructure; Network security; SME´s; Unified Threat Management (UTM);
Conference_Titel :
e-Business Engineering (ICEBE), 2012 IEEE Ninth International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-2601-8
DOI :
10.1109/ICEBE.2012.36