Strengthening Cybersecurity Governance: The Impact of Firewalls on Risk Management
DOI:
https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I4P106Keywords:
Cybersecurity Governance, Firewalls, Risk Management, Compliance, Next-Generation Firewalls (NGFWs), NIST Cybersecurity Framework, ISO/IEC 27001, Governance Frameworks, CybersecurityAbstract
In a fast-digitizing environment, the escalation of cyber threats along with increased sophistication and frequency requires strong cybersecurity governance frameworks that efficiently integrate risk and compliance management. The role of firewalls, traditional and NG, in enhancing cybersecurity governance and their ability to reduce organizational risk is explored in this paper. Subsequently, it examines the technological evolution of firewalls and their support of strategic governance principles to safeguard network infrastructures, compliance, and enterprise resiliency. Firewalls are not just seen as technical barriers are the key parts of proactive risk management and provide functionalities like identity-based access control, deep packet examination, and Real-time threat identification. The combination of firewall technologies with worldwide established standards and frameworks, as the NIST Framework for Cybersecurity and ISO/IEC 27001, is examined for the purpose of evaluating their ability to satisfy compliance and governance requirements. More in the same vein, the research highlights the emerging need for firewall adoption that can adapt to modern cybersecurity challenges, especially in cloud and container-based contexts
References
[1] J. Srinivas, A. K. Das, and N. Kumar, “Government regulations in cyber security: Framework, standards and recommendations,” Futur. Gener. Comput. Syst., 2019, doi: 10.1016/j.future.2018.09.063.
[2] A. Saravanan and S. S. Bama, “A Review on Cyber Security and the Fifth Generation Cyberattacks,” Orient. J. Comput. Sci. Technol., vol. 12, no. 2, pp. 50–56, Jun. 2019, doi: 10.13005/ojcst12.02.04.
[3] H. I. Kure, S. Islam, and M. A. Razzaque, “An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System,” Appl. Sci., vol. 8, no. 6, p. 898, May 2018, doi: 10.3390/app8060898.
[4] J. Ullrich, J. Cropper, P. Frühwirt, and E. Weippl, “The Role and Security of Firewalls in Cyber-Physical Cloud Computing,” EURASIP J. Inf. Secur., vol. 2016, no. 1, Dec. 2016, doi: 10.1186/s13635-016-0042-3.
[5] A. Conklin and G. B. White, “E-Government and Cyber Security: The Role of Cyber Security Exercises,” in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), IEEE, 2006, pp. 79b-79b. doi: 10.1109/HICSS.2006.133.
[6] S. Singamsetty, “Fuzzy-Optimized Lightweight Cyber-Attack Detection For Secure Edge-Based IoT Networks,” J. Crit. Rev., vol. 6, no. 7, 2019, doi: 10.53555/jcr.v6:i7.13156.
[7] R. De Bruin and S. H. von Solms, “Cybersecurity Governance: How Can we Measure it?,” in 2016 IST-Africa Week Conference, IEEE, May 2016, pp. 1–9. doi: 10.1109/ISTAFRICA.2016.7530578.
[8] V. Kolluri, “A Pioneering Approach To Forensic Insights: Utilization AI for Cybersecurity Incident Investigations,” Int. J. Res. Anal. Rev., vol. 3, no. 3, 2016.
[9] A. Kohnke and D. Shoemaker, “Making Cybersecurity Effective: The Five Governing Principles for Implementing Practical IT Governance and Control,” EDPACS, vol. 52, no. 3, pp. 9–17, Sep. 2015, doi: 10.1080/07366981.2015.1087799.
[10] S. Almuhammadi and M. Alsaleh, “Information Security Maturity Model for Nist Cyber Security Framework,” 2017. doi: 10.5121/csit.2017.70305.
[11] P. Pathak, A. Shrivastava, and S. Gupta, “A survey on various security issues in delay tolerant networks,” J Adv Shell Program., vol. 2, no. 2, pp. 12–18, 2015.
[12] D. Ganji, C. Kalloniatis, and H. M. G. Mouratidis, “Approaches to Develop and Implement ISO/IEC 27001 Standard - Information Security Management Systems: A Systematic Literature Review,” Int. Journalon Adv. Softw., vol. 12, no. 3, 2019.
[13] K. Georgieva, A. Farooq, and R. R. Dumke, “Analysis of the risk assessment methods - A survey,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5891 LNCS, pp. 76–86, 2009, doi: 10.1007/978-3-642-05415-0_6.
[14] P. A. S. Ralston, J. H. Graham, and J. L. Hieb, “Cyber security risk assessment for SCADA and DCS networks,” ISA Trans., vol. 46, no. 4, pp. 583–594, 2007, doi: 10.1016/j.isatra.2007.04.003.
[15] P. Katsumata, J. Hemenway, and W. Gavins, “Cybersecurity Risk Management,” in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, IEEE, Oct. 2010, pp. 890–895. doi: 10.1109/MILCOM.2010.5680181.
[16] S. R. Gudimetla, “Beyond the Barrier : Advanced Strategies for Firewall Implementation and Management,” vol. 13, no. 4, pp. 558–565, 2015, doi: | doi: 10.48047/nq.2015.13.4.876.
[17] Prof K. N. Barbole and S. D. Satav, “Next Generation Firewall in Modern Network Security,” Int. J. Data Netw. Secur., vol. 3, no. 2, pp. 84–91, 2013.
[18] K. Neupane, R. Haddad, and L. Chen, “Next Generation Firewall for Network Security: A Survey,” in SoutheastCon 2018, IEEE, Apr. 2018, pp. 1–6. doi: 10.1109/SECON.2018.8478973.
[19] J. Jena, “Next-Gen Firewalls Enhancing: Protection against Modern Cyber Threats,” Int. J. Multidiscip. Sci. Emerg. Res., vol. 03, no. 04, pp. 2015–2019, Apr. 2016, doi: 10.15662/IJMSERH.2015.0304046.
[20] A. V. Hazarika, G. J. S. R. Ram, E. Jain, D. Sushma, and Anju, “Cluster ASnalysis of Delhi crimes using different distance metrics,” in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), IEEE, Aug. 2017, pp. 565–568. doi: 10.1109/ICECDS.2017.8389500.
[21] L. Thames, R. Abler, and D. Keeling, “Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting,” in Proceedings of the 47th Annual ACM Southeast Conference, in ACMSE ’09. New York, NY, USA: Association for Computing Machinery, 2009. doi: 10.1145/1566445.1566476.
[22] A. Mehta and L. Rahmani, “Cybersecurity in the Cloud Era : Integrating AI , Firewalls , and Engineering for Robust Protection,” Int. J. Trend Sci. Res. Dev., vol. 3, no. 4, 2019.
[23] D. S. Thompson and J. Liu, “From Perimeter to Cloud : Innovative Approaches to Firewall and Cybersecurity Integration,” Int. J. Trend Sci. Res. Dev., vol. 3, no. 5, 2019.
[24] P. Eugen, “Exploring the New Era of Cybersecurity Governance,” Ovidius Univ. Ann. Econ. Sci. Ser., vol. XVIII, no. 1, pp. 358–363, 2018.
[25] E. Sutherland, “Cybersecurity: Governance of a New Technology,” SSRN Electron. J., no. March, pp. 26–28, 2018, doi: 10.2139/ssrn.3148970.
[26] Kalla, D., & Samiuddin, V. (2020). Chatbot for medical treatment using NLTK Lib. IOSR J. Comput. Eng, 22, 12.
[27] Kuraku, S., & Kalla, D. (2020). Emotet malware a banking credentials stealer. Iosr J. Comput. Eng, 22, 31-41.