118
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 6
Securing Enterprises
from Malicious Attacks
on their Networks
ABSTRACT
Routers interconnect networks of various enterprises, and the more secure the entry or exit points are
made, the more robust the security of these enterprises is. These routers become the frst direct targets
and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an
edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists
(ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme,
routers are confgured with Access Control Lists (ACL) that are used to flter in the intended packets and
flter out the dangerous malicious packets from network trafc. This consolidates security deployment
over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities,
and other related secure measures. This can help network technicians working for various enterprises
manage security at low costs.
INTRODUCTION
Businesses today depend upon various factors, but
one major component that all businesses must pay
attention to is how secure their online transactions
are, how secure their servers are and how secure
their network’s entry and exit points are. Everyone
is aware of Target’s recent security breach. The
reasons may be any, but the importance is of taking
every measure to make one’s networks secure. A
big company loses millions or billions of dollars
if it has to undergo security breach and it may take
much less money if spent on making the networks
robust and secure to begin with. There is always
Jameson Mbale
Copperbelt University, Zambia
Manish Wadhwa
Salem State University, USA
DOI: 10.4018/978-1-4666-6473-9.ch006