<?xml version="1.0" encoding="UTF-8"?>
<record>
  <title>Effectiveness of Application Software in the Simulation Boundary for Critical Data Protection </title>
  <journal>Journal of Information Security  Research</journal>
  <author>Liliia P. Galata, Bogdan Y. Korniyenko, Alexander K. Yudin</author>
  <volume>15</volume>
  <issue>3</issue>
  <year>2024</year>
  <doi>https://doi.org/10.6025/jisr/2024/15/3/89-102</doi>
  <url>https://www.dline.info/jisr/fulltext/v15n3/jisrv15n3_1.pdf</url>
  <abstract>This work develops and implements a simulation boundary designed to safeguard essential data assets using the application software GNS3. At the core of computer network security lies the Cisco ASA 5520 firewall, which segments the organizationâ€™s network into a demilitarized zone, encompassing an internal and external network. Within this demilitarized zone, web and FTP servers are set up. A network scan was conducted with the Zenmap utility to evaluate the effectiveness of the simulation boundary for critical data protection. Additionally, a stress test of the network was carried out using the hping3 utility. The measures taken to counter these simulated attacks were identified and documented.
</abstract>
</record>
