LAN security
LAN security
Network failure
Some of the causes include:
Hardware failure due to improper use, unstable power supply, network breakdown,
natural disaster, and program failure
For critical systems, most companies have put in place fault tolerant systems. A fault tolerant
system has redundant or duplicate storage, peripherals devices and software that provide a fail-over
capability to back up components in the event of network system failure.
Social engineering is getting users to reveal confidential information by causing them to make a
mistake or by tricking them.
Ways social engineering is done:
i) Attacker phones a department and claims he has to adjust something on the user’s system. The
user consequently reveals the password
ii) Attacker observes someone entering a password or PIN number then note it down.
It is called ‘shoulder surfing’.
iii) Attacker intimidates target by pretending to be someone senior in rank. Attacker may also
coax the target by engaging them in a friendly chat
iv) Attacker may comb through an organizations refuse to try and find useful documents, codes
e.t.c.
It is called ‘dumpster diving’.
Malicious programs are those programs that affect the smooth running of a network system or
carry out illegal activities such as secretly collecting information from a user. Some of the common
types of malicious programs include;
a) Virus
b) Trojan Horse
c) spyware (adware)
It is a program that monitors internet activity and sends the information to someone else. For
example, capturing a credit card number by recording key strokes entered into web form. The
presence of spyware is often indicated by numerous pop-up windows.
d) Backdoor and Rootkit
A backdoor application is one that is installed without the knowledge of the user/owner of
the computer.
Backdoor is installed using Trojan horse.
Examples: netbus, subseven, hack a tack, prosaic.
Backdoor allows attacker to access computer, upload files, install software on it and download
files.
Backdoors conceal their presence in the computer by having names similar to genuine computer
processes. But they can eventually be detected.
A rootkit is a class of backdoor that is hard to detect. Rootkit changes core system files so as
scanning tools do not detect its presence. Rootkit can also clean system logs so as to conceal its
actions.
e) Foot printing
Is a process of gathering information about the organization, its computer network configuration
and security systems with an intention to breach the security.
Footprinting can be done in two ways:
-Port scanning – identify which port is open, therefore which applications are running on that port.
-Eavesdropping – (A.K.A. sniffing) is capturing and reading data packets as they travel over the
network. It is tapping into communication channels to get information.
Hackers mainly use eavesdropping to access private or confidential information from
internet users or from poorly secured networks. If data packets are not encrypted, an attacker can
get all the information.
f) Spoofing (A.K.A. masquerade)
Is where attacker imitates a resource the victim (user) thinks is genuine.
Spoofing can be done in two ways:
-Phishing
Is a technique for tricking a user to reveal confidential information by requesting it as an official
looking site. (Perhaps pretending to come from a bank or a service provider.)
An attacker sets up a website to imitate a victim’s secure web site. Attacker then contacts
the clients of the victim (such as a bank) asking for confidential details. When details of clients are
provided, they are captured in the spoof site.
An attacker may also send an email. The email will normally contain a link to a fake online
site where the user is prompted to input confidential data such as online bank account numbers and
passwords.
-Pop up
Is where when a client visits a genuine banking web site, a pop up window appears, trying to trick
him to enter his personal details.
Physical threats
o Theft
One of the widespread computer related crimes, especially in developing countries, is
physical theft of the computer hardware and software. Now and again, we hear cases of the people
breaking into the offices and stealing computers, hard disks and other valuable computer
accessories. In most cases such theft may be done by untrustworthy employees of the firm (an
‘inside job’) or outsiders. The reason behind such an act may be commercial, destruction to
sensitive information or sabotage.
o With a network, a computer /device can be accessed as above (locally), or remotely. Remote
(and local) access to server (host), other computers and other network devices like router should
be guarded closely.
Control measures against local and remote access
-place servers, workstations and network equipment at the central buildings of the organization.
-position them from high traffic areas and any area accessible easily by the general public.
-monitor and control entrance to the building containing the above, through, e.g. security guards.
-put all computers and equipment under strong security padlocks. Lock doors and the computers
themselves.
-periodically inspect computers and all computer equipment.
-disable unused ports to prevent connecting of rogue devices.
-control who accesses the place where computers are by use of smart cards containing data on
who should access the places and by use of bio-recognition (biometrics)
-employ surveillance ways such as alarm systems and log in and log out of the computers by
users.
o Fraud
With a dynamic growth of internet and mobile computing, more sophisticated cyber crimes like
fraud are on the rise. Fraud is stealing by false pretence. Fraudsters can be either employees in a
company, non-existing company that purports to offer internet services such as selling of vehicles
and many other goods on internet. Other forms of fraud may also involve computerized production
and use of counterfeit documents
o Sabotage
Sabotage refers to illegal destruction of data and information with the aim of disrupting service
delivery, or causing great loss to an organization. Sabotage is usually carried out by disgruntled
employees or by competitors with the intention of causing harm to an organization.
Confidentiality on the other hand means that sensitive data or information belonging to an
organization or government should not be accessed by or disclose to unauthorized people. Private
and confidential data must be protected ageist unauthorized access or disclosure.
2. Identification of Access
There are 3 ways a computer system can verify that you have legitimate right of access:-
- What you have – cards, keys, signatures, badges
- What you know – pins, passwords and digital signatures
- Who you are – physical traits
What you have – people keep a lock on their personal computer. A computer room may
also be guarded by security officers who need to see an authorized signature or badge with your
photograph, before letting you in.
What you know – a password is a special word, code or symbol that is required to access a
computer system. A new technology is digital signature which is a string of characters and No’s
that user signs to an electronic document being sent by his computer. The receiving computer
performs alphanumeric calculation to verify its validity.
Who you are – this involves physical traits. Biometrics tries to use physical traits in
security devices. Biometric is the science of measuring individual body characteristics e.g. finger
prints, voice, the blood vessels in the back of the eye ball and the lips.
3. Simulation
Computer simulation involves trying to predict what will happen in a real life situation from a
model of that situation e.g. an engineer when designing a bridge, would like to know the effect of
various loading conditions on the bridge without actually having to build the bridge yet.
Simulation of network attacks helps to pinpoint areas of threat to networks and possible remedies.
4. Zoning
A zone is an area of a network where security configuration is the same for all hosts within it.
Network traffic within zones is strictly controlled and monitored using a firewall.
5. Encryption
Is concealing information by coding it such that someone can view it but cannot understand it.
Encryption serves as a guarantee of both privacy and a means of authentication.
8. Have backup