The Disruption Of Lan Functions

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

LAN SECURITY

Introduction

A LAN, or local area network, is a network of computers deployed in a small geographic area such as an office complex, building, or campus.

Local area networks (LANS) have become a major tool for many organizations in meeting data processing and data communication needs. In LAN, computers interconnect to each other to share resources like files, printers and services. LAN’s of various banks, financial institutes, and corporations store a lot of customer information like social security numbers, driver’s license and other sensitive information’s such as purchasing profiles. Over the years, although network security has increased, the frequency of attacks on the network has also increased (vacca).Many organizations use large LANs internally and also connect to public networks, such as the Internet. By doing so, organizations increase their exposure to threats from intruder activity (nist security handbook).In a corporate network LAN’s, securing the data is of paramount importance as the network is constantly under attack from hackers. Apart from the security threats by hackers there is also the threat of espionage by competitive companies. A competitor may hijack the resources such as web services; domain name services leading to Denial of Service.

There are three objectives of the network security

Confidentiality: Only authorized users have access to the network.

Integrity: Data cannot be modified by unauthorized users.

Access: Security must be designed so that authorized users have uninterrupted access to data (vacca).

Threats and Vulnerabilities

A threat can be any person, object, or event that, if realized, could potentially cause damage to the LAN. Threats can be malicious, such as the intentional modification of sensitive information, or can be accidental, such as an error in a calculation, or the accidental deletion of a file. Threats can also be acts of nature, i.e. flooding, wind, lightning, etc.

Vulnerabilities are flaws in a LAN that can be exploited by a threat resulting in loss. For example, unauthorized access (the threat) to the LAN could occur by an outsider guessing an obvious password. The vulnerability exploited is the poor password choice made by a user. Reducing or eliminating the vulnerabilities of the LAN can reduce or eliminate the risk of threats to the LAN. For example, a tool that can help users choose robust passwords may reduce the chance that users will utilize poor passwords, and thus reduce the threat of unauthorized LAN access (FIPS).

This paper discusses the various vulnerabilities of a LAN that an IT manager faces and the how the IT manager can mitigate these vulnerabilities.

Unauthorized LAN Access

A LAN provides designated users with shared access to hardware, software, and data.Unauthorized access to LAN resources is one of the greatest LAN vulnerability.. Unauthorized LAN access occurs when someone, who is not authorized to use the LAN, gains access to the LAN (Fips).This access type can be internal or external(intruder).

Password: Password sharing/capturing/guessing allows an unauthorized user to have the LAN access and privileges of a legitimate user; with the legitimate user's knowledge and acceptance. Unauthorized LAN access can occur by exploiting the password vulnerabilities like poor password management, easy guess password.

Network access: An unauthorized access to network nodes like switches, hubs or routers on LAN can be used by intruder to launch denial of service attacks. A network entry point and exit point are the most vulnerable network element. The most common threats from network are hijacking of resources such as Domain Name Service, antivirus, web services leading to DoS or distributed DoS attacks.(vacca)

Unauthorized access may occur simply because the access rights assigned to the resource are not assigned properly. However, unauthorized access may also occur because the access control mechanism or the privilege mechanism is not granular enough.

Loss of Data Confidentiality

Confidentiality is providing access and disclosure of information only to authorized user and preventing access to unauthorized users. The disclosure of LAN data or software occurs when the data or software is accessed, read and possibly released to an individual who is not authorized for the data results in loss of data confidentiality. The loss of data confidentiality can cause a company not only financial expenses but can also cause it to lose its reputation resulting in loss of customers. Improper access control, lack of data encryption policy and general display of monitors or printouts are some of the vulnerability that an attacker can use to cause to disrupt an Organization’s information systems.

2.1.4 Loss of Data Integrity

When an unauthorized changes are made to data or software it results in loss of data integrity (Fips). Data integrity is critical to any organization that maintains electronic records including: corporations, governmental agencies, non-profit organizations, service groups, medical practices and educational institutions. If the integrity of records is compromised, the impact on the organization could be horrific, resulting in financial records being exposed, the theft of customer or client identities, the exposure of strategic initiatives, loss of business, and even the malicious transfer of funds, all of which are potential outcomes, when an organization’s database technologies are compromised.(Hallman,Stahl and Ahmadov). PCs are especially vulnerable to viruses and related malicious software (e.g., Trojan horse, logic bomb, worm). An executing program, including a virus-infected program, has access to most things in memory or on disk. A PC LAN is also highly vulnerable, because any PC can propagate an infected copy of a program

2.1.5 Disclosure of LAN Traffic

The disclosure of LAN traffic occurs when someone who is unauthorized listens on the traffic in LAN that is intended for authorized user. Transmitting data in plaintext over LAN and inadequate protection of LAN devices compromises LAN security (Goodrich). LAN traffic can be compromised by listening and capturing traffic transmitted over the LAN transport media like tapping into a network cable, listening to traffic transmitted over the air, misusing a provided network connection by attaching an analysis device (FIPs).

Spoofing of LAN Traffic

Data that is transmitted over a LAN should not be altered in an unauthorized manner as a result of that transmission, either by the LAN itself, or by an intruder. It is expected by LAN users the message sent, is received unmodified. Spoofing of LAN traffic involves an attacker masquerading as a legitimate endpoint and sending or receiving messages on LAN. For example an attacker can modify the ARP messages sent on a LAN to launch man-in-the-middle attack. The lack of message authentication or digital signature, timestamp and identification verification make LAN vulnerable to ARP spoofing kind of attacks.

2.1.7 Disruption of LAN Functions

A LAN is a tool, used by an organization, to share information and transmit it from one location to another. A disruption of functionality occurs when the LAN cannnot provide the needed functionality in an acceptable, timely manner. A disruption can interrupt one type of functionality or many. A disruption of LAN functionalities can occur by exploiting the following types of vulnerabilities:

Vulnerabilities

inability to detect unusual traffic patterns (i.e. intentional flooding),

inability to reroute traffic, handle hardware failures, etc,

configuration of LAN that allows for a single point of failure,

unauthorized changes made to hardware components (reconfiguring addresses on workstations, modifying router or hub configurations, etc.), a improper maintenance of LAN hardware,

Improper physical security of LAN hardware. (FIPS)

LAN Security Management

A security service is the collection of mechanisms, procedures and other controls that are implemented to help reduce the risk associated with threat. For example, the identification and authentication service helps reduce the risk of the unauthorized user threat. Some services provide protection from threats, while other services provide for detection of the threat occurrence. An example of this would be a logging or monitoring service. The following services will be discussed in this section:

Identification and authentication - is the security service that helps ensure that the LAN is accessed by only authorized individuals.

Access control - is the security service that helps ensure that LAN resources are being utilized in an authorized manner.

Data and message confidentiality - is the security service that helps ensure that LAN data, software and messages are not disclosed to unauthorized parties.

Data and message integrity - is the security service that helps ensure that LAN data, software and messages are not modified by unauthorized parties.

Non-repudiation - is the security service by which the entities involved in a communication cannot deny having participated. Specifically the sending entity cannot deny having sent a message (non-repudiation with proof of' origin) and the receiving entity cannot deny having received a message (non-repudiation with proof of delivery).

Logging and Monitoring - is the security service by which uses of LAN resources can be traced throughout the LAN.

2.2.1 Identification and Authentication

User identification and authentication (verification) controls are used to verify the identity of a station, originator, or individual prior to allowing access to the system, or specific categories of information within the system. Identification involves the identifier or name by which the user is known to the LAN in some manner. This is usually based on an assigned userid. However the LAN cannot trust the validity that the user is in fact, who the user claims to be, without being authenticated. Authentication is the process of "proving" that the individual is actually the person associated with the identifier. A user can be authenticated using various mechanisms such as passwords, biometrics or token. Passwords are the most common authentication method used to control LAN access. An organization must have a password policy established by management to prevent passwords from being guessed or cracked. Password policies like password expiration, no reusable passwords strong passwords policies are the first step in defense of network.

Password-only mechanisms are vulnerable to password cracking and password capturing attacks.. Because of the vulnerabilities that still exist with the use of password-only mechanisms, more robust mechanisms can be used like token-based authentication and the use of biometrics. Locking mechanisms for LAN devices, workstations, or PCs that require user authentication to unlock can be useful to users who must leave their work areas frequently. These locks allow users to remain logged into the LAN and leave their work areas (for an acceptable short period of time ) without exposing an entry point into the LAN (FIPS).

2.2.2 Access Control

This service protects against the unauthorized use of LAN resources, and can be provided by the use of access control mechanisms and privilege mechanisms. Access control is the selective restriction of access to a place or other resource. For example, some information must be accessible to all users, some may be needed by several groups or departments, and some should be accessed by only a few individuals. The users must have access to the information they need to do their jobs, it may also be required to deny access to non-job-related information.

Access control can be achieved by using discretionary access control , mandatory access control or role based access control. Discretionary access control is the most common type of access control used by LANS. The basis of this kind of security is that an individual user, or program operating on the user's behalf is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the user's control. Discretionary security differs from mandatory security in that it implements the access control decisions of the user. Mandatory controls are driven by the results of a comparison between the user's trust level or clearance and the sensitivity designation of the information (FIPS)

A LAN operating system may implement user profiles, capability lists or access control lists to specify access rights for many individual users and many different groups. Using these mechanisms allows more flexibility in granting different access rights to different users, which may provide more stringent access control for the file (or directory). (These more flexible mechanisms prevent having to give a user more access than necessary, a common problem with the three level approach.) Access control lists assign the access rights of named users and named groups to a file or directory. Capability lists and user profiles assign the files and directories that can he accessed by a named user(FIPS).

These access controls can also be used to restrict usage between servers on the LAN. Many LAN operating systems can restrict the type of traffic sent between servers. There may be no restrictions, which implies that all users may be able to access resources on all servers (depending on the users access rights on a particular server). Some restrictions may be in place that allow only certain types of traffic, for example only electronic mail messages, and further restrictions may allow no exchange of traffic from server to server. The LAN policy should determine what types of information need to be exchanged between servers. Information that is not necessary to be shared between servers should then be restricted (FIPS).

Mechanisms

access control mechanism using access rights (defining owner, group, world permissions),

access control mechanism using access control lists, user profiles, capability lists,

access control using mandatory access control mechanisms (labels),

granular privilege mechanism.

2.2.3 Data and Message Confidentiality

These controls provide protection for data that must be held in confidence and protected from unauthorized disclosure.. As a front line protection, this service may incorporate mechanisms associated with the access control service, but can also rely on encryption to provide further secrecy protection. Encryption is a means of encoding (scrambling) data so that they are unreadable. When the data are received, the reverse scrambling takes place. The scrambling and descrambling requires an encryption capability at either end and a specific key, either hardware or software to code and decode the data. Encryption allows only authorized users to have access to applications and data.

It is very difficult to control unauthorized access to LAN traffic as it is moved through the LAN. For most LAN users, this is a realized and accepted problem. The use of encryption reduces the risk of someone capturing and reading LAN messages in transit by making the message unreadable to those who may capture it. Only the authorized user who has the correct key can decrypt the message once it is received.

A strong policy statement should dictate to users the types of information that a-re deemed sensitive enough to warrant encryption. A program level policy may dictate the broad categories of information that need to be stringently protected, while a system level policy may detail the specific types of information and the specific environments that warrant encryption protection. At whatever level the policy is dictated, the decision to use encryption should be made by the authority within the organization charged with ensuring protection of sensitive information. If a strong policy does not exist that defines what information to encrypt, then the data owner should ultimately make this decision (FIPS).

Mechanisms

file and message encryption technology,

protection for backup copies on tapes, diskettes, etc,

physical protection of physical LAN medium and devices,

use of routers that provide filtering to limit broadcasting (either by blocking or by masking message contents).

Explain some encryption methods public private

2.2.4 Data and Message Integrity

The data and message integrity service helps to protect data and software on workstations, file servers, and other LAN components from unauthorized modification. The unauthorized modification can he intentional or accidental. This service can be provided by the use of cryptographic checksums, and very granular access control and privilege mechanisms. The more granular the access control or privilege mechanism, the less likely an unauthorized or accidental modification can occur.

The data and message integrity service also helps to ensure that a message is not altered, deleted or added to in any manner during transmission. (The inadvertent modification of a message packet is handled through the media access control implemented within the LAN protocol.) Most of the security techniques available today cannot prevent the modification of a message, but they can detect the modifiation of a message (unless the message is deleted altogether).

The use of check-sums provide a modification detection capability. A Message Authentication Code (MAC), a type of cryptographic checksum, can protect against both accidental and intentional, but unauthorized, data modification. A MAC is initially calculated by applying a crvptographic algorithm and a secret value, called the key, to the data. The initial MAC is retained. The data is later verified by applying the cryptographic algorithm and the same secret key to the data to produce another MAC; this MAC is then compared to the initial MAC. If the two MACs are equal, then the data is considered authentic. Otherwise, an unauthorized modification is assumed.

The use of electronic signatures can also be used to detect the modification of data or messages. An electronic signature can be generated using public key or private key cryptography. Using a public key system, documents in a computer system are electronically signed by applying the originator s private key to the document. The resulting digital signature and document can then be stored or transmitted. The signature can be verified using the public key of the originator. If the signature verifies properly, the receiver has confidence that the document was signed using the private key of the originator and that the message had not been altered after it was signed. Because private keys are known only to their owner, it may also possible to verify the originator of the information to a third party. A digital signature, therefore, provides two distinct services: nonrepudiation and message integrity. FIPS PUB 186, Digital Signature Standard, specifies a digital signature algorithm that should he used when message and data integrity are required.

The message authentication code (MAC) described above can also be used to provide an electronic signature capability. The MAC is calculated based on the contents of the message. After transmission another MAC is calculated on the contents of the received message. If the MAC associated with the message that was sent is not the same as the MAC associated with the message that was received, then there is proof that the message received does not exactly match the message sent. A MAC can he used to identify the signer of the information to the receiver. However, the implementations of this technology do not inherently provide nonrepudiation because both the sender of the information and the receiver of the information share the same key. The types of security mechanisms that could be implemented to provide the data and message integrity service are listed below.

Mechanisms

message authentication codes used for software or files,

use of secret key based electronic signature,

use of public key digital signature,

granular privilege mechanism,

appropriate access control settings (i.e. no unnecessary write permissions),

virus detection software,

workstations with no local storage (,to prevent local storage of software and files),

workstations with no diskette drive/tape drive to prevent introduction of suspect software.

use of public key digital signatures.

2.2.5 Non-repudiation

Non-repudiation helps ensure that the entities in a communication cannot deny having participated in all or part of the communication. When a major function of the LAN is electronic mail, this service becomes very important. Non-repudiation with proof of origin gives the receiver some confidence that the message indeed came from the named originator. The nonrepudiation service can be provided through the use of public key cryptographic techniques using digital signatures. See Section 2.2.4 Data and Message Integrity for a description and use of digital signatures. The security mechanism that could be implemented to provide the non- repudiation service is listed below.

Mechanisms

use of public key digital signatures.

2.2.6 Logging and Monitoring

This service performs two functions. The first is the detection of the occurrence of a threat. (However, the detection does not occur in real time unless some type of real-time monitoring capability is utilized.) Depending on the extensiveness of the logging, the detected event should be traceable throughout the system. For example, when an intruder breaks into the system, the log should indicate who was logged on to the system at the time, all sensitive files that had failed accesses, all programs that had attempted executions, etc. It should also indicate sensitive files and programs that were successfully accessed in this time period. It may be appropriate that some areas of the LAN (workstations, fileservers, etc.) have some type of logging service.

The second function of this service is to provide system and network managers with statistics that indicate that systems and the network as a whole are functioning properly. This can be done by an audit mechanism that uses the log file as input and processes the file into meaningful information regarding system usage and security. A monitoring capability can also be used to detect LAN availability problems as they develop. The types of security mechanisms that could be used to provide the logging and monitoring service are listed below.

Mechanisms

logging of I&A information (including source machine, modem, etc.),

logging of changes to access control information,

logging of use of sensitive files,

logging of modifications made to critical software,

utilizing LAN traffic management tools,

use of auditing tools. (FIPS)

Audit Trail Mechanisms. Audit controls provide a system monitoring and recording capability to retain

or reconstruct a chronological record of system activities (e.g., system log files). These audits records help to establish accountability when something happens or is discovered. Audit controls should be implemented as part of a planned LAN security program. LANs have varying audit capabilities, which include:

· Exception logs record information relating to system anomalies such as unsuccessful password or logon attempts, unauthorized transaction attempts, PC/remote dial-in lockouts, and related matters. Exception logs should be reviewed and retained for specified periods.

· Event records identify transactions entering or exiting the system, and journal tapes are a backup of the daily activities.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now