{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T22:41:55Z","timestamp":1697582515525},"reference-count":9,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.<\/p>","DOI":"10.4018\/jdtis.2011040103","type":"journal-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T13:05:15Z","timestamp":1333631115000},"page":"40-60","source":"Crossref","is-referenced-by-count":1,"title":["Network Security and Firewall Technology"],"prefix":"10.4018","volume":"2","author":[{"given":"Afolayan A.","family":"Obiniyi","sequence":"first","affiliation":[{"name":"Ahmadu Bello University, Nigeria"}]},{"given":"Ezugwu E.","family":"Absalom","sequence":"additional","affiliation":[{"name":"Ahmadu Bello University, Nigeria"}]},{"given":"Mohammed","family":"Dikko","sequence":"additional","affiliation":[{"name":"Ahmadu Bello University, Nigeria"}]}],"member":"2432","reference":[{"key":"jdtis.2011040103-0","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.23"},{"key":"jdtis.2011040103-1","doi-asserted-by":"crossref","unstructured":"Beznosov, K., & Kruchten, P. (2005). Towards agile security assurance. In Proceedings of the Workshop on New Security Paradigms, Nova Scotia, Canada (pp. 47-54).","DOI":"10.1145\/1065907.1066034"},{"key":"jdtis.2011040103-2","doi-asserted-by":"crossref","unstructured":"Geer, D., & Harthorne, J. (2002). Penetration testing: A duet. In Proceedings of the 18th Annual Computer Security Applications Conference (pp. 185-195).","DOI":"10.1109\/CSAC.2002.1176290"},{"key":"jdtis.2011040103-3","author":"M. K.Kaeo","year":"2001","journal-title":"Designing network security"},{"key":"jdtis.2011040103-4","author":"T.Lammle","year":"2007","journal-title":"Cisco Certified Network Associates (CCNA), study guide"},{"key":"jdtis.2011040103-5","doi-asserted-by":"crossref","unstructured":"Logan, P. Y., & Clarkson, A. (2005). Teaching students to hack: Curriculum issues in information security. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, St. Louis, MO (pp. 157-161).","DOI":"10.1145\/1047124.1047405"},{"key":"jdtis.2011040103-6","author":"P. L.Loshin","year":"2003","journal-title":"TCP\/IP clearly explained"},{"key":"jdtis.2011040103-7","author":"E.Oz","year":"2006","journal-title":"Management information systems"},{"key":"jdtis.2011040103-8","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G. J., & Lear, E. (1996). RFC 1918 - Address allocation for private Internets. Retrieved from http:\/\/www.faqs.org\/rfcs\/rfc1918.html","DOI":"10.17487\/rfc1918"}],"container-title":["International Journal of Dependable and Trustworthy Information Systems"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=65521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:19:09Z","timestamp":1654125549000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdtis.2011040103"}},"subtitle":["A Step to Safety of National IT Vision"],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jdtis.2011040103","relation":{},"ISSN":["1947-9050","1947-9069"],"issn-type":[{"value":"1947-9050","type":"print"},{"value":"1947-9069","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}