10.5120/17751-8837 |
Leonard L Mutembei, Aloys N Mvuma and Tabu S Kondo. Article: Network Security Analysis in the Enterprise LANS. International Journal of Computer Applications 101(13):37-42, September 2014. Full text available. BibTeX
@article{key:article, author = {Leonard L. Mutembei and Aloys N. Mvuma and Tabu S. Kondo}, title = {Article: Network Security Analysis in the Enterprise LANS}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {101}, number = {13}, pages = {37-42}, month = {September}, note = {Full text available} }
Abstract
Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure stability of the network during scaling out as the number of staff continues to grow.
References
- Internet World Stats, 2011. "World Internet Users and Population Stats", [http://www. internetworldstats. com/stats. htm], site visited on August 28, 2013.
- TCRA, 2010. "Report on Internet and Data Service in Tanzania" [http://www. tcra. go. tz/publications/InternetDataSurveryScd. pdf], site visited on 23, January 2012.
- Internet Systems Consortium, 2011. "Internet Domain Survey, July 2011", [ftp. isc. org/www/survey/reports/2011/07/], site visited on September 10, 2013.
- Cornwall, H. 1985. The hacker's handbook, Century Communications Ltd, Portland House, 12-13 Greek Street, London W1V 5LE.
- Whittaker, Z. 2010. "Virus attack Hits Vista machines, cripples university network", [http://www. zdnet. com/blog/igeneration/virus-attack-hits-vista-machines-cripples-university-network/3954], site visited on March 25, 2012.
- Alabady, S. 2009. "Design and Implementation of a Network Security Model For Cooperative Network," International Arab Journal of e-Technology, Vol. 1, No. 2.
- http://www. sans. org/network_security. php, site visited on October 10, 2013.
- Daya, B. 2011. "Network Security: History, Importance, and Future", [http://web. mit. edu/~bdaya/www/Network%20Security. pdf], site visited on February 19, 2012.
- ICT Headquarters, 2012. "Networking", [http://icthq. org/network-security], site visited on January 20, 2012.
- Dowd, P. W. and McHenry, J. T. 1998. "Network Security: It's Time to Take It Seriously", Computer, vol. 31, no. 9, pp. 24-28.
- http://www. wisegeek. com/what-is-network-security-analysis. htm, site visited on October 10, 2013.
- Vulnerability scanning with SAINT scanner, [http://www. saintcorporation. com /solutions/vulnerabilityScan. html], site visited on March 28, 2012.
- Vacca, J. R. 2010. Network and System Security, Syngress
- Bacudio, G. A. , Yuan, X. , Chu, B. B. and Jones, M. 2011. "An overview of penetration testing", International Journal of Network Security & Its Application (IJNSA), Vol. 3, No. 6.
- Tilak, P. 2011. "Technical White Paper on Penetration Testing", [http://www. docstoc. com/docs/70280500/White-Paper-on-Penetration-Testing], site visited on July 17, 2012.
- BackTrack, [http://www. backtrack-linux. org/], site visited on February 5, 2012.
- TENABLE Network Security, "Nessus 5", [http://www. nessus. org/products/nessus], site visited on June 10, 2012.
- Nmap, [http://nmap. org/zenmap/], site visited on February 5, 2012.