Local Area Network Operations: A Security, Control and Audit Perspective

1990 ◽  
Vol 5 (2) ◽  
pp. 63-72 ◽  
Author(s):  
Rodger Jamieson ◽  
Graham Low

This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and concerns highlighted. Controls and security measures are proposed as guidelines to counter these threats. An approach to the audit of each major area of network operations is proposed. This suggested framework provides guidance to information system security officers, auditors, communications and network administrators, consultants and information systems management for the review of local area network security during network operations.

Author(s):  
Cristinel Marius VASILE

Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.


1989 ◽  
Vol 9 (7) ◽  
pp. 51-52 ◽  
Author(s):  
M. Suzuki ◽  
T. Matsuda ◽  
N. Ohashi ◽  
Y. Sano ◽  
R. Tsukui ◽  
...  

Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2008 ◽  
pp. 1349-1360
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


1989 ◽  
Vol 4 (3) ◽  
pp. 1668-1675 ◽  
Author(s):  
M. Suzuki ◽  
T. Matsuda ◽  
N. Ohashi ◽  
Y. Sano ◽  
R. Tsukui ◽  
...  

Author(s):  
Osman Goni

A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.


10.28945/2491 ◽  
2002 ◽  
Author(s):  
Kaj J. Grahn ◽  
Göran Pulkkis ◽  
Jean-Sebastien Guillard

This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.


2014 ◽  
Vol 114 (2) ◽  
pp. 439-460 ◽  
Author(s):  
Hongmei Gao ◽  
Hongbei Cao ◽  
Yan Xu ◽  
Ya Zhou ◽  
Yubo Feng ◽  
...  

Implicit Schadenfreude of disaster spectators, with augmentation of implicit self-esteem and higher reward responsiveness as indicators, and the influence of insecurity and masculinity was explored in two studies. Both studies were conducted under conditions without any clearly legitimizing factors. Experimental (priming with disaster video) and control (priming with neutral video) groups were compared using the Implicit Association Test in Study 1, the results of which showed augmentation of implicit self-esteem in the experimental group. In Study 2, participants who read and believed a fabricated news report of fire disaster via a local area network website showed higher reward responsiveness in a reward-based signal-detection task. Other results showed that insecurity negatively predicted the augmentation of implicit self-esteem and reward responsiveness, while masculinity only negatively predicted the augmentation of implicit self-esteem.


Author(s):  
CHRISTINE STRAUSS ◽  
CHRISTIAN STUMMER

Security issues in information management are increasingly moving towards the centre of corporate interests. This paper presents a multiobjective modelling approach that interactively assists IT managers in their attempts to reduce a given risk by evaluating and selecting portfolios (i.e. bundles) of security measures. The proposed multi-step procedure identifies attractive portfolio candidates and finally establishes the "best" one with respect to the decision-maker's preferences. Our model and its possible application are demonstrated by means of a numerical example based on real-world data that evaluates the risk of hacking faced by a Local Area Network in an academic environment.


Author(s):  
Dang Quang Hieu ◽  
Nguyen Xuan Truong

The article presents the basic principles of design and development of integrated middle range Coastal Surveillance System (CSS) used for water surface lookout. It provides solutions for such missions as command and control of maritime forces, border monitoring and control, prevention of illegal activities such as piracy, smuggling, illegal immigration, illegal fishing, supporting search and rescue (SAR) operations, and creates a common situation awareness picture of the Naval Theatre. The system structure diagram is designed to solve computational overload problem when processing large volume of data received from radar stations. The measurement-level fusion algorithm is developed based on the JPDA framework, in which radar data received from a single or group of radars and AIS data is aggregated in a processing center. The servers and workstations make use of local area network (LAN), using standard Gigabit Ethernet technologies for local network communications. Acquisition, analysis, storage and distribution of target data is executed in servers, then the data is sent to automated operator stations (console), where functional operations for managing, identifying and displaying of target on digital situational map are performed.


Sign in / Sign up

Export Citation Format

Share Document