Matematik ve Bilgisayar Bölümü Tezleri
Permanent URI for this collectionhttps://hdl.handle.net/20.500.12416/222
Browse
Browsing Matematik ve Bilgisayar Bölümü Tezleri by Subject "Ağ Güvenliği"
Now showing 1 - 1 of 1
- Results Per Page
- Sort Options
Item Citation Count: Ahmad, Ahmad Ayid (2017). Unified threat management (UTM): A comparative study / Birleştirilmiş tehdit yönetimi (BTY): Karşılaştırmalı bir çalışma. Yayımlanmış yüksek lisans tezi. Ankara: Çankaya Üniversitesi Fen Bilimleri Enstitüsü.Unified threat management (UTM): A comparative study(Çankaya Üniversitesi, 2017) Ahmad, Ahmad Ayid; Çankaya Üniveristesi, Fen Bilimleri Enstitüsü, Matematik Bilgisayar Anabilim DalıNetwork security has been the foremost need of the technologically advanced world, when considering the implications in the business environment. It has been affirmed that the business enterprises have intensively become susceptible to the data theft or data breaching attacks over the internet; thus, credibility of the processes has been affected. Businesses that lack in being considerate towards the competitive needs of the strategies tend to face declining performance. It leads to the assertion that the decision making process of the businesses must be based on the deployment of continuous improvement prospects. In this thesis, we assessed the business stance of an Imaginary Organisation that led to the assertion that the current network infrastructure of traditional firewall needs to be upgraded. The existing traditional firewall has been disabled to standing against security threats such as Denial of Service, SQL injection, email viruses ..etc. Therefore, the study has been proposed to the migration plan of an Imaginary Organisation network that serve 200 users with developed security services. The plan has been presented to the UTM as advanced features security solution. In order to select the best UTM that satisfied the demands of an Imaginary Organization security requirements, a comparison study among four commercial UTMs has been held. This study achieved by using a virtual lab that consistent from a multi virtual machines that was used as a test environment. The four UTMs have been assessed based on the attributes of visions, execution, ease of use, web-interfaces, device performance, throughput capacity, intrusion prevention system features along with the guaranteed elements of security and many other factors. The experimental work includes installation and test of the software's such as SONICWALL, SOPHOS XG Firewall, WarchGuard, and Palo Alto Networks. The researcher also analyses the impacts of Gartner's reviews along with testing lab result to come out with conclusions that the UTM device called SOPHOS XG Firewall was the best tested device based on study criteria. This device provides the most significant security features affordably. SOPHOS XG Firewall provides the security features such as email protection, Unknown Application Identification, along with the element of Full-Featured Web Application Firewall that able to prevent SQL injection attacks and Denial of service ..etc which traditional firewalls and other UTMs may not be capable of doing. Moreover, the study has presented details in this regard, along with the clearly articulated recommendations as well.