DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Design and assembly of a topological network diagram that provides security, confidentiality, integrity and availability in the data network of the company Controles Empresariales SAS Neiva


Article Information

Title: Design and assembly of a topological network diagram that provides security, confidentiality, integrity and availability in the data network of the company Controles Empresariales SAS Neiva

Authors: Jesús D. Quintero-Polanco, Jesús D. Joven-Vega, Martin D. Bravo-Obando

Journal: ARPN Journal of Engineering and Applied Sciences

HEC Recognition History
Category From To
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
X 2020-07-01 2021-06-30

Publisher: Khyber Medical College, Peshawar

Country: Pakistan

Year: 2021

Volume: 16

Issue: 23

Language: English

Categories

Abstract

The perimeter security system is a possible method of defense of a network, based on the establishment of security resources in the external perimeter of the network at different levels. This study established a perimeter security system for the company Controles Empresariales SAS - Regional Neiva taking into account the basic pillars of cyber security, Haredization manuals and ISO 27001 standard. Through the identification of different types and brands of Firewall devices, we selected the option that best suited the needs of the Company. The necessary guidelines were established for the design of the topological network diagram, the Firewall was installed, configured and parameterized, the configuration of the interfaces in Software Switch mode in order to be able to differentiate the traffic in the different VLANs. Finally, the network access users were created and the security profiles, the SSL VPNs were established and the equipment of the Company's collaborators were configured, carrying out bandwidth consumption tests, vulnerability analysis and security audit at the system.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...