Call for Paper

CAE solicits original research papers for the July 2021 Edition. Last date of manuscript submission is June 30, 2021.

Read More

Isolation of Private Network from Internet, Secure Internet Virtual Environment

Ahmad Alamgir Khan Published in Security

Communications on Applied Electronics
Year of Publication: 2015
© 2014 by CAE Journal
10.5120/cae-1524

Ahmad Alamgir Khan. Article: Isolation of Private Network from Internet, Secure Internet Virtual Environment. Communications on Applied Electronics 1(3):15-17, February 2015. Published by Foundation of Computer Science, New York, USA. BibTeX

@article{key:article,
	author = {Ahmad Alamgir Khan},
	title = {Article: Isolation of Private Network from Internet, Secure Internet Virtual Environment},
	journal = {Communications on Applied Electronics},
	year = {2015},
	volume = {1},
	number = {3},
	pages = {15-17},
	month = {February},
	note = {Published by Foundation of Computer Science, New York, USA}
}

Abstract

There are numerous ways to secure computers including utilizing security-aware design techniques, building on secure operating systems and installing hardware devices designed to protect the computer systems. At the same time, many organizations are improving security and many types of cyber criminals are finding ways to continue their activities. Cyber threats will continue to rise, interconnectivity of people, devices and organizations, poses more risk than ever before. The employees poses a significant risk to an organization, due to the lack of security awareness and inherit insecure nature of the Internet. The dependency on Internet has increased enormously and staying connected is no longer choice but necessity. So keeping this is view, this research paper aims to present a novel approach to isolate the private network (Organization or Home Network) from the public (Internet). It is an approach in which the Internet is accessed through Open Source Secure Customized Linux Operating System where only necessary packages are installed. The Customized OS is configured with necessary security features. In the Host Machine the customized OS runs through a Virtual Machine in its own separate network which is connected to Internet. There will be no interconnection between the Host and the VM network. By isolating the Private from Public network, there will be significant improvement in the security of the private networks.

Reference

  1. Richardson, R. (2010). 2009 CSI Computer Crime & Security Survey. Computer Security Institute. Computer Security Institute.
  2. http://www. internetlivestats. com/internet-users/1:21 pm 19 Jan 2015
  3. http://antivirus. about. com/od/virusdescriptions/a/Antivirus-Software-Technology. htm 2/18/15
  4. http://in. norton. com/cybercrimereport/promo Wednesday 2/18/2015
  5. Turban, E; King, D; Lee, J; Viehland, D (2008). "Chapter 19: Building E-Commerce Applications and Infrastructure". Electronic Commerce A Managerial Perspective. Prentice-Hall. p. 27.
  6. www. opensuse-guide. org 27 Jan 2015 at 12:43 pm Updated: 23 November, 2014
  7. http://blogs. msdn. com/b/ie/archive/2014/11/02/announcing-remoteie-test-the-latest-ie-on-windows-mac-os-x-ios-and-android. aspx 27 Jan 2015 at 12:47 pm
  8. https://susestudio. com accessed: 28 Jan 2015 11:23 am
  9. http://www. infosecurity-magazine. com/news/malware- no-longer-avoids-virtual/
  10. http://www. zdnet. com/article/researcher-critical-vulnerability-found-in-vmwares-desktop-apps/ Wednesday 2/18/2015
  11. http://www. infosecurity-magazine. com/news/malware-no-longer-avoids-virtual/Wednesday 2/18/2015

Keywords

SIVM (Secure Internet Virtual Environment), VMWare Player, VM Virtual Box, SUSE Studio, Linux Packages, Private and Public Network Isolation, Host Machine, Sandboxing.