{"title":"Perimeter Network Security Solutions: A Survey","authors":"Goksel Uctu, M. Alkan, I. Dogru, Murat Dörterler","doi":"10.1109/ISMSIT.2019.8932821","DOIUrl":null,"url":null,"abstract":"Technically, cyber security requires a combination of various engineering disciplines. Ensuring security also requires a multi-disciplinary and multi-layered structure. Similar to OSI or TCP / IP models, which form the basis of network technologies, security should be provided in each layer that creates cyber space. These are perimeter network security, internal network security, endpoint security, data security, policy management and operations. In this study, current peripheral cyber security solutions are discussed; the use of these technologies, their working methods, their development and their future trends have been demonstrated.","PeriodicalId":169791,"journal":{"name":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMSIT.2019.8932821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Technically, cyber security requires a combination of various engineering disciplines. Ensuring security also requires a multi-disciplinary and multi-layered structure. Similar to OSI or TCP / IP models, which form the basis of network technologies, security should be provided in each layer that creates cyber space. These are perimeter network security, internal network security, endpoint security, data security, policy management and operations. In this study, current peripheral cyber security solutions are discussed; the use of these technologies, their working methods, their development and their future trends have been demonstrated.