Design Of an Enterprise Network Terminal Security Solution
Home Research Details
Muhammad Idris Abubakar, Ajayi Ore-Ofe, Abubakar Umar, Ibrahim Ibrahim, Lawal Abdulwahab Olugbenga, Ajikanle Abdulbasit Abiola

Design Of an Enterprise Network Terminal Security Solution

0.0 (0 ratings)

Introduction

Design of an enterprise network terminal security solution. Secures enterprise network terminals & critical data from IoT, BYOD, and remote threats. This solution optimizes performance using double-step VPNs and protects datacenter components.

0
40 views

Abstract

This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability of critical data and network resources, the paper presents a logical approach to designing an enterprise network security solution with a primary focus on optimizing and enhancing the performance of the network terminals (and datacenter critical end devices) security solution. The traditional network infrastructure has predominantly centered the security measured on core network components such as Firewalls, Intrusion Detection Systems/Intrusion Prevention Systems (IDS/SPS) but there are encountered security incidences, this is due to the exponential growth of the Internet of Things (IoT) devices, Bring Your Device (BYOD), and remote workforce trends, the network terminals have become the key points through which users access and utilize network resources for malicious attack and in most cases critical end devices such as servers/storage are the end target. This paper presents a comprehensive framework that places considerable emphasis on improving the terminal security performance by utilizing the existing encryption techniques (VPN) to provide double-step tunnels (VPN). However, in the event of an inevitable attack, the paper also presents a framework of how data center core end components, such as server and storage can be protected from the attack. The paper starts by studying the terminal ecosystem, the current terminal security solution, and the latest terminal security solution and designing the solution deemed fit to secure the terminal network.


Review

This paper, "Design Of an Enterprise Network Terminal Security Solution," addresses a highly pertinent and critical issue in contemporary network security: the protection of enterprise network terminals and critical end devices. The abstract effectively highlights the paradigm shift in threat landscapes, moving beyond traditional core network security measures to focus on the vulnerabilities introduced by the exponential growth of IoT, BYOD, and remote workforces. The stated aim to safeguard confidentiality, integrity, and availability, with a primary focus on optimizing and enhancing terminal security performance, positions the paper as a timely and relevant contribution to the field. The proposed solution adopts a logical approach, beginning with a study of the terminal ecosystem and existing security solutions, which is a commendable starting point for a robust design. A notable strength is the emphasis on improving terminal security performance through the utilization of "double-step VPN tunnels," suggesting an innovative application of existing encryption techniques. Furthermore, the paper’s comprehensive framework extends beyond proactive measures, thoughtfully considering post-attack protection mechanisms for data center core components like servers and storage, thereby addressing both preventative and reactive security postures. This dual focus on endpoint hardening and critical asset protection underpins the solution's potential to enhance overall enterprise resilience. While the abstract provides a compelling overview, certain aspects warrant further technical elaboration within the full paper. The concept of "double-step VPN tunnels" is intriguing, but the abstract leaves questions regarding its specific technical implementation, the novel security benefits it offers over single-layer VPNs, and potential performance implications. A deeper dive into how this mechanism specifically optimizes and enhances *performance* while simultaneously improving security would strengthen the argument. Additionally, while protecting core components during an "inevitable attack" is crucial, the paper would benefit from a more explicit discussion on how the terminal security solution *prevents* such attacks from propagating to the data center, rather than solely focusing on reactive measures. A comparative analysis with other modern endpoint security approaches (e.g., EDR, XDR, Zero Trust Network Access) would also help contextualize the proposed solution's unique contribution and practical advantages.


Full Text

You need to be logged in to view the full text and Download file of this article - Design Of an Enterprise Network Terminal Security Solution from Vokasi Unesa Bulletin of Engineering, Technology and Applied Science .

Login to View Full Text And Download

Comments


You need to be logged in to post a comment.