Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Network Security Analysis in the Enterprise LANS

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 13
Year of Publication: 2014
Authors:
Leonard L. Mutembei
Aloys N. Mvuma
Tabu S. Kondo
10.5120/17751-8837

Leonard L Mutembei, Aloys N Mvuma and Tabu S Kondo. Article: Network Security Analysis in the Enterprise LANS. International Journal of Computer Applications 101(13):37-42, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Leonard L. Mutembei and Aloys N. Mvuma and Tabu S. Kondo},
	title = {Article: Network Security Analysis in the Enterprise LANS},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {13},
	pages = {37-42},
	month = {September},
	note = {Full text available}
}

Abstract

Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure stability of the network during scaling out as the number of staff continues to grow.

References

  • Internet World Stats, 2011. "World Internet Users and Population Stats", [http://www. internetworldstats. com/stats. htm], site visited on August 28, 2013.
  • TCRA, 2010. "Report on Internet and Data Service in Tanzania" [http://www. tcra. go. tz/publications/InternetDataSurveryScd. pdf], site visited on 23, January 2012.
  • Internet Systems Consortium, 2011. "Internet Domain Survey, July 2011", [ftp. isc. org/www/survey/reports/2011/07/], site visited on September 10, 2013.
  • Cornwall, H. 1985. The hacker's handbook, Century Communications Ltd, Portland House, 12-13 Greek Street, London W1V 5LE.
  • Whittaker, Z. 2010. "Virus attack Hits Vista machines, cripples university network", [http://www. zdnet. com/blog/igeneration/virus-attack-hits-vista-machines-cripples-university-network/3954], site visited on March 25, 2012.
  • Alabady, S. 2009. "Design and Implementation of a Network Security Model For Cooperative Network," International Arab Journal of e-Technology, Vol. 1, No. 2.
  • http://www. sans. org/network_security. php, site visited on October 10, 2013.
  • Daya, B. 2011. "Network Security: History, Importance, and Future", [http://web. mit. edu/~bdaya/www/Network%20Security. pdf], site visited on February 19, 2012.
  • ICT Headquarters, 2012. "Networking", [http://icthq. org/network-security], site visited on January 20, 2012.
  • Dowd, P. W. and McHenry, J. T. 1998. "Network Security: It's Time to Take It Seriously", Computer, vol. 31, no. 9, pp. 24-28.
  • http://www. wisegeek. com/what-is-network-security-analysis. htm, site visited on October 10, 2013.
  • Vulnerability scanning with SAINT scanner, [http://www. saintcorporation. com /solutions/vulnerabilityScan. html], site visited on March 28, 2012.
  • Vacca, J. R. 2010. Network and System Security, Syngress
  • Bacudio, G. A. , Yuan, X. , Chu, B. B. and Jones, M. 2011. "An overview of penetration testing", International Journal of Network Security & Its Application (IJNSA), Vol. 3, No. 6.
  • Tilak, P. 2011. "Technical White Paper on Penetration Testing", [http://www. docstoc. com/docs/70280500/White-Paper-on-Penetration-Testing], site visited on July 17, 2012.
  • BackTrack, [http://www. backtrack-linux. org/], site visited on February 5, 2012.
  • TENABLE Network Security, "Nessus 5", [http://www. nessus. org/products/nessus], site visited on June 10, 2012.
  • Nmap, [http://nmap. org/zenmap/], site visited on February 5, 2012.