In an era marked by evolving cyber threats, the imperative for robust cybersecurity posture has become paramount. This thesis delves into the realm of advanced cybersecurity strategies, focusing on the integration of cutting-edge technologies to fortify network defenses. The research explores the harmony and integration benefits between firewall management and micro-segmentation tools. This integration provides an automatization of real-time data transmission for enhanced security. The study begins by elucidating the foundational concepts of firewall management, micro-segmentation and their individual roles in safeguarding enterprise networks. Then, continues with the details of the utilized brands during research and dives into, what they are and how they work. A significant portion of the thesis is dedicated to the explanation and integration of firewall management and micro-segmentation tools, showcasing the symbiotic relationship between these technologies. The research presents a comprehensive analysis of the mechanisms involved in the seamless coordination of firewall policies and micro-segmentation strategies. The implementation aspect of the study unveils a developed framework that exemplifies the successful integration of firewall management and micro-segmentation tools. The solution that is developed for a special case, also ensures not only enhanced security but also streamlined operations through the automated real-time transmission of critical data. The results are evaluated to demonstrate the integration's effect on cyber resilience and monitoring efficiency and shown with more of a qualitative perspective due to privacy policies the quantitative results are restricted. However, the fact that all the machines that are required to be imported, is achieved in the lab environment with 100/100 accurate transmission and providing real-time monitoring. This quantitative results can be broadened via performing various attack scenarios and observing real-life scenarios. To sum up, the goal is to provide better visibility, effective control over IT systems simultaneously and illustrate a significant reduction in vulnerabilities in this way.
In an era marked by evolving cyber threats, the imperative for robust cybersecurity posture has become paramount. This thesis delves into the realm of advanced cybersecurity strategies, focusing on the integration of cutting-edge technologies to fortify network defenses. The research explores the harmony and integration benefits between firewall management and micro-segmentation tools. This integration provides an automatization of real-time data transmission for enhanced security. The study begins by elucidating the foundational concepts of firewall management, micro-segmentation and their individual roles in safeguarding enterprise networks. Then, continues with the details of the utilized brands during research and dives into, what they are and how they work. A significant portion of the thesis is dedicated to the explanation and integration of firewall management and micro-segmentation tools, showcasing the symbiotic relationship between these technologies. The research presents a comprehensive analysis of the mechanisms involved in the seamless coordination of firewall policies and micro-segmentation strategies. The implementation aspect of the study unveils a developed framework that exemplifies the successful integration of firewall management and micro-segmentation tools. The solution that is developed for a special case, also ensures not only enhanced security but also streamlined operations through the automated real-time transmission of critical data. The results are evaluated to demonstrate the integration's effect on cyber resilience and monitoring efficiency and shown with more of a qualitative perspective due to privacy policies the quantitative results are restricted. However, the fact that all the machines that are required to be imported, is achieved in the lab environment with 100/100 accurate transmission and providing real-time monitoring. This quantitative results can be broadened via performing various attack scenarios and observing real-life scenarios. To sum up, the goal is to provide better visibility, effective control over IT systems simultaneously and illustrate a significant reduction in vulnerabilities in this way.
Enhancing Cybersecurity Posture through Integration of Firewall Management and Micro-Segmentation Tools
CIFTPINAR, NURI BERK
2023/2024
Abstract
In an era marked by evolving cyber threats, the imperative for robust cybersecurity posture has become paramount. This thesis delves into the realm of advanced cybersecurity strategies, focusing on the integration of cutting-edge technologies to fortify network defenses. The research explores the harmony and integration benefits between firewall management and micro-segmentation tools. This integration provides an automatization of real-time data transmission for enhanced security. The study begins by elucidating the foundational concepts of firewall management, micro-segmentation and their individual roles in safeguarding enterprise networks. Then, continues with the details of the utilized brands during research and dives into, what they are and how they work. A significant portion of the thesis is dedicated to the explanation and integration of firewall management and micro-segmentation tools, showcasing the symbiotic relationship between these technologies. The research presents a comprehensive analysis of the mechanisms involved in the seamless coordination of firewall policies and micro-segmentation strategies. The implementation aspect of the study unveils a developed framework that exemplifies the successful integration of firewall management and micro-segmentation tools. The solution that is developed for a special case, also ensures not only enhanced security but also streamlined operations through the automated real-time transmission of critical data. The results are evaluated to demonstrate the integration's effect on cyber resilience and monitoring efficiency and shown with more of a qualitative perspective due to privacy policies the quantitative results are restricted. However, the fact that all the machines that are required to be imported, is achieved in the lab environment with 100/100 accurate transmission and providing real-time monitoring. This quantitative results can be broadened via performing various attack scenarios and observing real-life scenarios. To sum up, the goal is to provide better visibility, effective control over IT systems simultaneously and illustrate a significant reduction in vulnerabilities in this way.File | Dimensione | Formato | |
---|---|---|---|
Cybersecurity_MsC_Thesis___UniPD_Nuri_Berk_Ciftpinar_2041268.pdf
accesso aperto
Dimensione
2.51 MB
Formato
Adobe PDF
|
2.51 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/62030