CFP last date
01 May 2024
Reseach Article

Isolation of Private Network from Internet, Secure Internet Virtual Environment

by Ahmad Alamgir Khan
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 3
Year of Publication: 2015
Authors: Ahmad Alamgir Khan

Ahmad Alamgir Khan . Isolation of Private Network from Internet, Secure Internet Virtual Environment. Communications on Applied Electronics. 1, 3 ( February 2015), 15-17. DOI=10.5120/cae-1524

@article{ 10.5120/cae-1524,
author = { Ahmad Alamgir Khan },
title = { Isolation of Private Network from Internet, Secure Internet Virtual Environment },
journal = { Communications on Applied Electronics },
issue_date = { February 2015 },
volume = { 1 },
number = { 3 },
month = { February },
year = { 2015 },
issn = { 2394-4714 },
pages = { 15-17 },
numpages = {9},
url = { },
doi = { 10.5120/cae-1524 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-09-04T18:37:28.773348+05:30
%A Ahmad Alamgir Khan
%T Isolation of Private Network from Internet, Secure Internet Virtual Environment
%J Communications on Applied Electronics
%@ 2394-4714
%V 1
%N 3
%P 15-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

There are numerous ways to secure computers including utilizing security-aware design techniques, building on secure operating systems and installing hardware devices designed to protect the computer systems. At the same time, many organizations are improving security and many types of cyber criminals are finding ways to continue their activities. Cyber threats will continue to rise, interconnectivity of people, devices and organizations, poses more risk than ever before. The employees poses a significant risk to an organization, due to the lack of security awareness and inherit insecure nature of the Internet. The dependency on Internet has increased enormously and staying connected is no longer choice but necessity. So keeping this is view, this research paper aims to present a novel approach to isolate the private network (Organization or Home Network) from the public (Internet). It is an approach in which the Internet is accessed through Open Source Secure Customized Linux Operating System where only necessary packages are installed. The Customized OS is configured with necessary security features. In the Host Machine the customized OS runs through a Virtual Machine in its own separate network which is connected to Internet. There will be no interconnection between the Host and the VM network. By isolating the Private from Public network, there will be significant improvement in the security of the private networks.

  1. Richardson, R. (2010). 2009 CSI Computer Crime & Security Survey. Computer Security Institute. Computer Security Institute.
  2. http://www. internetlivestats. com/internet-users/1:21 pm 19 Jan 2015
  3. http://antivirus. about. com/od/virusdescriptions/a/Antivirus-Software-Technology. htm 2/18/15
  4. http://in. norton. com/cybercrimereport/promo Wednesday 2/18/2015
  5. Turban, E; King, D; Lee, J; Viehland, D (2008). "Chapter 19: Building E-Commerce Applications and Infrastructure". Electronic Commerce A Managerial Perspective. Prentice-Hall. p. 27.
  6. www. opensuse-guide. org 27 Jan 2015 at 12:43 pm Updated: 23 November, 2014
  7. http://blogs. msdn. com/b/ie/archive/2014/11/02/announcing-remoteie-test-the-latest-ie-on-windows-mac-os-x-ios-and-android. aspx 27 Jan 2015 at 12:47 pm
  8. https://susestudio. com accessed: 28 Jan 2015 11:23 am
  9. http://www. infosecurity-magazine. com/news/malware- no-longer-avoids-virtual/
  10. http://www. zdnet. com/article/researcher-critical-vulnerability-found-in-vmwares-desktop-apps/ Wednesday 2/18/2015
  11. http://www. infosecurity-magazine. com/news/malware-no-longer-avoids-virtual/Wednesday 2/18/2015
Index Terms

Computer Science
Information Sciences


SIVM (Secure Internet Virtual Environment) VMWare Player VM Virtual Box SUSE Studio Linux Packages Private and Public Network Isolation Host Machine Sandboxing.