100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Security Implications for each Network Topology £8.57   Add to cart

Essay

Security Implications for each Network Topology

 181 views  2 purchases

Goes into the implications for each Network Type.

Preview 1 out of 2  pages

  • November 5, 2021
  • 2
  • 2020/2021
  • Essay
  • Unknown
  • B
All documents for this subject (45)
avatar-seller
Scrumlin
LAN (Local Area Network)
Data being transmitted over a network could be a security problem. This is because a hacker could intercept
the data transmission and steal the data. To reduce this from happening, the organisation could use a VPN to
encrypt the data their sending, so they know that it is save during the sending.

Masquerading can be a security issue with LAN’s because a malicious person could send a request to the
organisation’s servers, pretending to be someone trustworthy. This is a problem because if the organisation
grants the request, they could cause disruption to the organisations system. To reduce this from happening,
they could log the user’s activity in the file system to see what they’re looking at, in order to see if they’re
searching broadly or in a specific place.

WLAN (Wireless Local Area Network)
DOS attacks are a threat to WLAN’s security because the network could get overloaded with requests and it
could make the network slow or not work at all. To reduce this from happening, organisations could use
software to defend themselves from these attacks, these detect DOS attacks and block them.

Unauthorised access can be a problem for WLAN’s. This is because hackers could test the system to find
backdoors, infiltrating the system and stealing the organisations data. To prevent this, the organisation could
hire people to test the security of their system and report to them any flaws they find, this will enable them to
find backdoors and fix them before people with malicious intent find them and cause serious damage.

SAN (Storage Area Network)
Encryption could be a security issue. This is because Storage Area Networks aren’t encrypted by default. This
could lead to problems such as confidential data being stolen. To prevent this, the organisation would have to
encrypt it themselves in order to get the security to a good enough standard.

Authentication can be a security issue for SAN’s because parts of one do not require a user to prove who they
are. This is a problem because anyone could gain access to the data the SAN is storing, then can use it for their
own purposes. To reduce this from happening, the organisation

WAN (Wide Area Network)
DDOS attacks are a threat to a WAN’s security because a hacktivist group could use their resources to overload
the organisations network with thousands of requests. This could have huge impacts of them because they
would have to spend a few days setting everything back up again. To reduce the impact this has, the
organisation could monitor the requests they get to see if anything suspicious happens.

Malware is a security issue to WAN’s. This is because if hacker got into the organisations network, they could
upload malware to it. It could destroy their files or even stop their computers working properly. To reduce this
from happening, the organisation could install anti-virus software in order to scan the files before they’re
uploaded.

PAN (Personal Area Network)
Bluetooth attacks can be a security issue with PAN’s. This is a problem because hackers could find a
vulnerability in the Bluetooth software and listen into conversations through employee’s phones. A way for the
organisation to get around this problem is they could tell their employees to turn off their Bluetooth when
they’re not using it, in order to reduce the threat.

Brute force attacks are a security problem for PAN’s. A brute force attack is where hackers guess every possible
combination of a password in order to gain access to a system. This is a problem to PAN’s because hackers
could try many times to guess the password of their network in order to spread malware or other malicious
activities. To help prevent this, the organisation could pout a limit to how many times a person can attempt to
put the password in.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scrumlin. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £8.57. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79650 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£8.57  2x  sold
  • (0)
  Add to cart