Network security analysis in the enterprise LANS
No Thumbnail Available
Date
Journal Title
Journal ISSN
Volume Title
Publisher
Foundation of Computer Science
Abstract
Description
Abstract. Full-text article available at: https://doi.org/10.5120/17751-8837
Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates the establishment of new offices. However, the reliability and security of services provided by ELANs need to be ensured at all times to meet the expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure the stability of the network during scaling out as the number of staff continues to grow.
Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates the establishment of new offices. However, the reliability and security of services provided by ELANs need to be ensured at all times to meet the expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure the stability of the network during scaling out as the number of staff continues to grow.
Keywords
ELANs, Local Area Networks, Enterprise Local Area Networks, LAN, Network security, Networking devices, Network, Security policy