Zarrar Ahmad Niazi
Security Aspects of Local Area Networks
I will be discussing security issues related to the Local Area Networks, which are groups of personal computers connected together to share data and devices.
Personal Computers have a few inherent security features and opening up new channels of access for and between them is very risky proportion. W hen you establish connections between computers either locally or over long distances, you need to take several important security measures.
Normal security problems associated with a computer, which is not connected, are increased when you connect many computers together. You can call this factor of LAN security "Multiplication factor". When you open up communication channels between computer systems and provide access in to a computer through any port, it creates a new security area that can be called "Channel factor". The multiplication and channel factor together create a set of security problems that are called network security.
The multiplication factor
The security of computers that are connected starts with individual computer security. You can not connect a number of insecure computers and create a secure Local Area Network with them, unless you remove all local storage and processing, which will turn a PC in to a dumb terminal. A good operating system provides good security measures but these are not enough if the individual systems are not secured. If someone have uncontrolled use of your PC and you are connected to a network then that person can easily attack the network. The person might have difficulty logging on from your PC but the network itself can not do anything to protect the PC. This is a serious problem.
Most of the PCs in default state come unlocked and unprotected. Windows 95 is the first system in many years that contains plenty of hooks to which network security features can be attached but it offers no stand alone security.
Following are some precautions that should be taken.
The channel factor
An ideal approach to stand-alone can be summarised like this
Access Control
1- Site- controlling who can get near to the system.
2- System- controlling who can get near to the system.
3-File - Controlling who can use specific files.
System Support
1- Power- keeping the supply of power clear and constant.
A 2- Back up- Keeping copy of files current.
3- Vigilance- having information about what enters and leaves the system.
This arrangement needs to be expanded when a computer system is connected to a Local Area Network. This creates another area that is called channel protection, which can be divided in to three parts.
Channel Control
- A connection between many computers is another way for an attacker to steel, delete and corrupt the information and programs. You can prevent this by controlling who can open, use and close a channel.
Channel Verification
- For safe communication you need to do the following variation.User of a communication channel should be required to identify themselves. When you are acting as the host for users calling in you need to verify the claimed identity. On a Local Area Network this means each user has an ID number and a password. Both must be entered to log in.
It tells the administrator who suppose to be using the system. In small sites administrator can usually check if the right person is logged on. Verifying the integrity of the channel means making sure listening in or preventing the theft if some one is doing so.
Channel Support
- Inter computer communication can be established only when a large number of parameters are properly co-ordinated. Once established the communication needs to be maintained. It means you need to rely on communication hardware and software.
LAN Security Goals and Terms
The above-mentioned three security factors channel control, channel variation, channel support must be addressed when defining the goals of LAN security, which add a fourth element authenticity.
LAN Threats
There might be many threats to a LAN but I will discuss particular threats here.
Unauthorised LAN access
- It can occur by exploiting the following types of vulnerabilities.
Inappropriate access to LAN resources
- Results from an individual gaining access to LAN resources in an unauthorised manner. It is caused by the
Disclosure of Data
- The disclosure of software or LAN data occurs when they are accessed, read and released to an individual who is not authorised. Following are the causes
Unauthorised modification of data and software
- Results from an individual modifying, deleting or destroying LAN data and software in an unauthorised or accidental manner. These are the causes
Disclosure of LAN Traffic
- It occurs some one who is unauthorised reads or gets information as it moves through LAN. It is caused by
Spoofing of LAN traffic
- Results when message to have been sent from a legitimate name sender, when actually it had not been. It happens when
Disruption of LAN functions
- Results from threats that block LAN resources from being available in a timely manner. (Can not do a job with in set time limit)These are the causes