Network Security in LANs for SOHO users and SMEs.
Table of Contents.
1.Absract, Aims & Obectives
1.1 Proposed Title 3
1.2 Abstract 3
1.3 Aims & Objectives 4
1.5 Ethical Consideration
Aims & objectives.
1.1 Proposed Title
Network Security in LANS for SOHO users and SMES
The reason for this report is to reinforce, and realise why it is necessary to have a knowledge of network security for protecting computer networks and to ascertain why people would want to gain access to company data and use this for malicious intentions as well as go through the process of how events like this can be avoided and minimise security breaches via hardware security(VPN based routers, proper router configuration) and software security(VPNS, Firewalls, Anti-Virus).
Identifying vulnerabilities within the multiple components of a businesses network is essential to the smooth running of a business this includes – end devices, transmission media and intermediary devices.
Provide a look into some of the techniques used, how these network devices are vulnerable, the possibility of surveying firms to assess what type of protection they have assigned to their network as well as how that has been implemented and if this has been successful
Although specifically targeted at LAN networks I will cover the wireless aspects of networks and how they can be exploited and manipulated, as well as covering how this can be mitigated(Wireless exploitation is hard to outright avoid).
This paper will look to show how SOHO users and SMES are vulnerable to attacks, how these attacks can be avoided and when they can not be avoided, how they can be quelled, while also covering the hardware & software used to achieve these solutions.
1.3 Aims and Objectives.
The use of networks is prevalent all around the world, more so with high level large coorporations where networks will be used globally, this is changing and SMEs as well as SOHO business are seeing the benefits of a well maintained secure computer network, allowing access to potential clients/customers all around the world.
This article will look at differing ways businesses can construct a network based on standards set for commercial/home and industrial networks based on the ISO/IEC 11801-x standards set by the ISO/IEC JTC 1/SC 25 which is a subcommittee of standardisation of the Joint Technical Committee ISO/IEC JTC 1 “of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC),”  . Other ways for businesses to be well prepared and the how to navigate the rigours of the modern world for small to medium sized businesses.
The aims of the report is to:
- To identify how and why local area networks are vulnerable going over the various security risks wich are found in numerous computer networks
- To give an idea on the most efficient way to design and thus implement a computer network
- To bring to the attention of the reader, stats and surveys that pertain to the knowledge end users have of how secure their networks are, this will include home and business networks
- Using stats to look into how network security is looked over and not paid much attention too (ie; seen as an unnecessary expense) how slack business owners are with security.
- Using the information gathered, look at how the above can be avoided and set out instructions for future enterprises to take when implementing and securing their own computer network.
It is important that all users of the LAN network are aware of the dangers of that can effect a business large, medium or small.
Network attacks can have a marginal effect on businesses, it can cause loss of income, loss of custom as well as a drop in reputation, which coupled together can could be the end of a company, less likely so for a large corporation where PR can be managed but more so smaller companies (SOHO/SMEs) can be effected to the point where administration leading to dissolvement of said company is a real issue.
Administrators and security staff must be vigilant to what employees have access to and what changes can be made by which staff, for example sales staff being able to manipulate network settings should not be happening, without proper training which the system administrator/head of IT should have these settings should be left them.
In a recent threat report conducted by McAfee Labs the top network attacks were recorded from April through to June, recording which were prevelant the outcome of which saw Browser attacks and Brute force being the most popular.
According to a report by the Identity Theft Resource Center, In the US alone between 2016/2017 there were around 1,579 data breaches that were recorded, this does not include breaches that were not recorded, this was an uptake of 44 percent from the year previous which again was 40 percent the year previous, this report also goes on to show that all sectors are vulnerable not just Tech companies. 
Browser based attacks are started on legitimate websites where the target may navigate to, but if this website has a vulnerability the target will use the site to infect the client pc with malware
The most vulnerable web browsers of 2016 according to Symantec were (descending order)
- Microsoft Edge/Internet Explorer
A brute force attack are difficult to avoid, these can be mitigated though with good password protection policies, brute force attacks are done via trial and error of inputting username and passwords so the only way to prevent this type of attack is to stop employees from sharing personal details and passwords, as well as enforcing high level password policies forcing users to use complicated passwords, another way is to have passwords expire.
Denial of Service
- Barry J Elliott (2002). Designing a Structured Cabling System to ISO 11801. 2nd ed. America: CRC Press. 250.
- ISO/IEC 11801 in Wikipedia: The Free Encyclopedia, Wikimedia Foundation Inc., viewed 23 April 2016, https://en.wikipedia.org/wiki/ISO/IEC_11801#cite_note-flatman1-5 .
- Top 8 Network Attacks by Type in 2017 BY CALYPTIX, OCTOBER 23, 2017
- Symantec Corporation . (2016). Internet Security Threat Report Volume 22 Available: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf Last accessed 27/02/2019q 
- ID Theft Center. (2017). 2017 Data Breaches. Available: https://www.idtheftcenter.org/2017-data-breaches/ Last accessed 27/02/2019.
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
DMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: