Wireless networks have advanced quickly over the most recent of years because of the improvements of new wireless standards and cost-effective wireless hardware. This has prompted broad selection of the innovation in home and private companies. Notwithstanding, the vulnerabilities and threats that wireless networks are exposed to resulted in higher risk for unauthorized users to access the computer networks. This paper assesses the security status of Wireless Local Area Networks (WLAN) use by occupants and coffee houses in two noteworthy city communities of Libya. The objective is to assess the security vulnerabilities that lie underneath the use of WLAN by the general population in Libya. Information will be gathered from different populated locales and will be analyzed to better understand the wireless security awareness among the public.
Information security in the banking sector is heavily controlled as banks store and manage their clients' private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. It is a real task to protect these bank procedures, systems from the attackers and minimize the security threats. With this Cyber-attacks increasing day by day, and this is the challenge facing by countries and organizations like banking where data is critical. These banks should be built networks using secure strategies to protect their components. However, the performance of the network is affected by applying security rules. Network security is an essential priority for protecting applications, data, and network resources. Applying resource isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying the DMZ (Demilitarized Zone) design. A DMZ extremely enhances the security of a network. In this paper perimeter network security framework is proposed to the protection and minimize the cybersecurity issue that exists in Libyan banks effectively. General TermsSecurity is one of the most critical challenges of computer and communication networks. The network design should accomplish three security aims: confidentiality, integrity, and availability. Protecting a network that is connected to the internet is a big challenge. To establish a secure network a defense-in-depth strategy where security measures are placed in many layers that create an entire network, from the enduser to the Internet, will be essential. The network perimeter layer has historically been the focus of protecting a private network and is still essential for keeping intruders at bay and providing detection of possible intrusions [3]. A DMZ is a network added between a protected network and an external network to provide an additional layer of security. A DMZ is the front line of a network that protects the valuables resources from untrusted environments. It is an example of the principle of defense in depth [4].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.