Home Area Network Case Study

Great Essays
HOME AREA NETWORK: A SECURITY PERSPECTIVE
INTRODUCTION:
The interconnection of computers within each other and advantage that go with networking has made a road into every household. due to the reduce in pricing of personal computers(pc) and networking hardware has further helped the household person to intake what is popular termed as home area network(HAN) . With the latest version of operating system that are available in market including network wizards that make configuring home area network very simple for the local people. Anyone can connect their pc with switch and power on the equipment and immediately he/she is having a home area network in their own place.
In America, most of the people love to work and play on their computer
…show more content…
The main issue with the HANs is that administrative right being granted to all user. Moreover the poor password control. No control over the backup of sensitive data individually or system wide, in place.

HAN INTERFACE
THE HAN/BAN use case diagram of actors , logical interface, and networks was derived from the DR,H2G,I2G and AMI system diagram of the FERC4+2 diagram develop by the EPRI team for the NIST phase 1 project. This HAN diagram capture the key interface used by the business processes described in the following section.

HANS SECURITY CONDITIONS
As given for the specific risk, there are the five strategies available to security decision maker to mitigate risk: avoidance, reduction spreading, transfer and acceptance. The goal of most security programs is to reduce risk. Risk mitigation is accomplished by decreasing the threat level by eliminating or intercepting the advisory before they attack, blocking opportunities through enhanced security, or reducing the consequences if an attack should occur. Without question, the best strategy for the mitigation risk is a combination of all three element, decreasing threats, blocking opportunities and reducing
…show more content…
HAN security task would depend on the technology, hardware, software and the kind of the public access (internet) connection used. The attempt of this paper is to come up with the last list of actions that need to be taken to secure most HANs. The consideration of the activities below begins with more general to the specific.
The use of anti-virus and anti-spyware program.
Use of poor password.
Use of default password and change with firewall make the backup of the rules.

CONCLUSION
After all the finding done above it is concluded that there are number of security issue that exist with the HANs. However the little attention to the configuration of the HAN will address a large number of HAN configuration. Since the security is not a onetime product it will continue till the product is alive. And with the HANs security it can be trusted confidently by the private, commercial or official purposes. It likely that with the upcoming of WLANs by HANs the need for security only increase. Therefore, special attention needs to be paid to such HANs when these are integrated with the wired

Related Documents

  • Decent Essays

    In addition to the secure provided by the integrated services Router a Cisco ASA 5540 Adaptive Security Appliance will be installed behind…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    From physical security to device security applications our network will be protected against both internal and external threats. The above mentioned architecture will step data through a variety of security configurations which will methodically mitigate the top four possible security threats. Additional support from the ISP may also be required when confronting DOS attacks as may attempt to overload security appliances. This will be mitigated by our multiple ISP connection but we must include information about DOS attacks in our service agreement with the ISP. Our network will prove to be more secure than other WWTC branches and will most likely become the security standard across the…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Po2 Cavanaugh Case Study

    • 197 Words
    • 1 Pages

    Evaluation submitted upon the occasion of PO2 Cavanaugh's transfer to NCTAMS PAC. - DEVELOPING LEADER. As Assistant Leading Petty Officer, she managed a team of four field technicians contributing 56 off-duty hours resolving Tactical Local Area Network Encryption connectivity issues for Ship Repair Facility command, successfully restoring critical network capability for 24-hour watch stations. Responsible for the resolution of 30 trouble tickets providing 40 off-duty hours troubleshooting pier connectivity allowing 13 forward-deployed naval force ships to maintain 98% uptime for internet protocol services. - TECHNICAL ACUMEN.…

    • 197 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Network Networks

    • 1368 Words
    • 6 Pages

    Different cables have different characteristics and it is important to learn about the different cables available on a network to develop a successful network. In this report I will be discussing and comparing the…

    • 1368 Words
    • 6 Pages
    Improved Essays