Home Area Network Case Study

Great Essays
HOME AREA NETWORK: A SECURITY PERSPECTIVE
INTRODUCTION:
The interconnection of computers within each other and advantage that go with networking has made a road into every household. due to the reduce in pricing of personal computers(pc) and networking hardware has further helped the household person to intake what is popular termed as home area network(HAN) . With the latest version of operating system that are available in market including network wizards that make configuring home area network very simple for the local people. Anyone can connect their pc with switch and power on the equipment and immediately he/she is having a home area network in their own place.
In America, most of the people love to work and play on their computer
…show more content…
The main issue with the HANs is that administrative right being granted to all user. Moreover the poor password control. No control over the backup of sensitive data individually or system wide, in place.

HAN INTERFACE
THE HAN/BAN use case diagram of actors , logical interface, and networks was derived from the DR,H2G,I2G and AMI system diagram of the FERC4+2 diagram develop by the EPRI team for the NIST phase 1 project. This HAN diagram capture the key interface used by the business processes described in the following section.

HANS SECURITY CONDITIONS
As given for the specific risk, there are the five strategies available to security decision maker to mitigate risk: avoidance, reduction spreading, transfer and acceptance. The goal of most security programs is to reduce risk. Risk mitigation is accomplished by decreasing the threat level by eliminating or intercepting the advisory before they attack, blocking opportunities through enhanced security, or reducing the consequences if an attack should occur. Without question, the best strategy for the mitigation risk is a combination of all three element, decreasing threats, blocking opportunities and reducing
…show more content…
HAN security task would depend on the technology, hardware, software and the kind of the public access (internet) connection used. The attempt of this paper is to come up with the last list of actions that need to be taken to secure most HANs. The consideration of the activities below begins with more general to the specific.
The use of anti-virus and anti-spyware program.
Use of poor password.
Use of default password and change with firewall make the backup of the rules.

CONCLUSION
After all the finding done above it is concluded that there are number of security issue that exist with the HANs. However the little attention to the configuration of the HAN will address a large number of HAN configuration. Since the security is not a onetime product it will continue till the product is alive. And with the HANs security it can be trusted confidently by the private, commercial or official purposes. It likely that with the upcoming of WLANs by HANs the need for security only increase. Therefore, special attention needs to be paid to such HANs when these are integrated with the wired

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Po2 Cavanaugh Case Study

    • 197 Words
    • 1 Pages

    Evaluation submitted upon the occasion of PO2 Cavanaugh's transfer to NCTAMS PAC. - DEVELOPING LEADER. As Assistant Leading Petty Officer, she managed a team of four field technicians contributing 56 off-duty hours resolving Tactical Local Area Network Encryption connectivity issues for Ship Repair Facility command, successfully restoring critical network capability for 24-hour watch stations. Responsible for the resolution of 30 trouble tickets providing 40 off-duty hours troubleshooting pier connectivity allowing 13 forward-deployed naval force ships to maintain 98% uptime for internet protocol services. - TECHNICAL ACUMEN.…

    • 197 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Router to router 4. Pc to pc. Wi-Fi Technology This was used to connect the electronic devices used in the network using the 2.4-gigahertz.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Network Networks

    • 1368 Words
    • 6 Pages

    NETWORK CABLES Network cables are the medium used for information to move from one network device to another. There are many different types of cable which are often used in Local Area Networks. Most network set-ups are likely to use a variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology.…

    • 1368 Words
    • 6 Pages
    Improved Essays