118 Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 6 Securing Enterprises from Malicious Attacks on their Networks ABSTRACT Routers interconnect networks of various enterprises, and the more secure the entry or exit points are made, the more robust the security of these enterprises is. These routers become the frst direct targets and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists (ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme, routers are confgured with Access Control Lists (ACL) that are used to flter in the intended packets and flter out the dangerous malicious packets from network trafc. This consolidates security deployment over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities, and other related secure measures. This can help network technicians working for various enterprises manage security at low costs. INTRODUCTION Businesses today depend upon various factors, but one major component that all businesses must pay attention to is how secure their online transactions are, how secure their servers are and how secure their network’s entry and exit points are. Everyone is aware of Target’s recent security breach. The reasons may be any, but the importance is of taking every measure to make one’s networks secure. A big company loses millions or billions of dollars if it has to undergo security breach and it may take much less money if spent on making the networks robust and secure to begin with. There is always Jameson Mbale Copperbelt University, Zambia Manish Wadhwa Salem State University, USA DOI: 10.4018/978-1-4666-6473-9.ch006