Download file to see previous pages...
Although, VLAN 1 simplifies the installation process of the switch significantly, it also makes the network vulnerable to unauthorized access (Liska, 2003).
To improve security on switches, Liska (2003) suggested that the default VLAN should be removed, and each port on the switch should be added to the appropriate VLAN (P.S. Empty ports should be configured with no VLAN). In case if the switch does not allow removal of the default VLAN, then the active ports on the switch should be switched to different VLAN.
Liska (2003) further emphasized that the port which is connected to the upstream switch or router should be removed from the default VLAN because it is tagged with all of the VLANs, and therefore, it can provide a gateway to all the traffic on the network if an attacker is successful in determining the default VLAN for the tagged port.
The OSI model is based on layered model in which the communication protocol divides its functionality into a series of layers. Each layer provides services to its subsequent, upper layer, and requires services from its preceding, lower layer. However, each layer is isolated from other layers and operates independently to perform a subset of functions. Although, the layer independence provides interoperability and interconnectivity, it also causes security risks because if any layer is compromised, then other layers remain unaware of this (Wong & Yeung, 2009).
In OSI model, the Data Link Layer (Layer 2) is very crucial because all the upper layers rely on it to provide the reliable data transfer across physical link – if this layer is compromised, then the entire communication session is compromised. Therefore, it is extremely important to secure this layer and take appropriate measures to mitigate attacks on this layer (Wong & Yeung, 2009).
VLAN-based networks are vulnerable to various attacks. Many of these attacks can be initiated by those with the LAN access, from outside the switch.
...Download file to see next pagesRead More
This paper discusses some of the potential threats to network security and the ways to mitigate them. The paper also renders useful information about network security policing. Information presented in paper can be used by companies to improve their network security and make the system efficient.
Further, it involves taking an insight into the working procedure of communications systems and the vulnerabilities of the communication network to proactively detect possible intrusion and cybercrime activities. The risk involved should be analyzed in the network with regards to cybercrime and the effects.
As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.
5 Threats and Vulnerabilities to a network 6 Threats to a network 6 Types of Vulnerabilities 9 Network Security Policy 10 Firewall 11 Internet Protocol Security 11 References 13 Abstract Networks from the time of their birth have come a long way. Initially, they were only used in large firms and businesses.
In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security.
New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies.
In the same way, the Internet is a huge network of numerous small and medium networks. Additionally, the Internet has turned out to be an essential part of our lives and business tasks. Though, these advanced technologies offer a large number of benefits and opportunities but they also cause a wide variety of security and privacy issues.
Generally, smartphones have a wide range of applications the most common of which is business and enterprise purposes. The blackberry, a smartphone designed and distributed by Research in Motion (RIM) limited is no doubt among the leaders when it comes to smartphones.
Differentiated Services Field is not set. This byte was originally called the Type of Service (ToS) byte, but was redefined by RFC 2474 as the DS Field. It is used for marking packets for the purpose of applying different quality of service QoS) levels to different packets
According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information. Consequently, internet security has become one of the most researched aspects of information technology.
10 Pages(2500 words)Research Paper
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Research Paper on topic VLAN Network Security for FREE!