With an ever increasing amount of information being transmitted electronically, it is important that security be considered in every phase of local area network design and maintenance. Although much emphasis has been placed on such things as wireless networks and remote access, it is imperative that the core local area network not be overlooked. Because the wired local area network is the nervous system of an organization’s Information Systems, great care must be taken to properly secure it. This chapter begins by looking at the implications for the wired local area network infrastructure security. Next, local area network segmentation and traffic isolation will be discussed. By using segmentation and isolation, there is the increased opportunity for security boundaries. Another concept that will be discussed is the security of the local area network equipment. The local area network is only functional if the core equipment is operational, so securing equipment is an important part of any security strategy. To conclude, restriction of local area network access will be investigated and an organizational approach will be discussed. Because more and more users need access to local area network resources, there must be a way to identify and restrict who is allowed on the network and what access they are granted. In wired local area network infrastructure security, organizations must remember they are only as secure as their weakest point. By carefully considering the various aspects of the local area network security during design, these weak points can be reduced and the overall security of the network increased. Although it is impossible to be 100% secure and still be functional, by using some general guidelines to secure the wired local area network, many threats to the network can be reduced if not eliminated.
Type: BOOK - Published: 2013-08-26 - Publisher: Elsevier Inc. Chapters
With an ever increasing amount of information being transmitted electronically, it is important that security be considered in every phase of local area network design and maintenance. Although much emphasis has been placed on such things as wireless networks and remote access, it is imperative that the core local area
Type: BOOK - Published: 2014-05-12 - Publisher: Butterworth-Heinemann
Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available. Organized into three parts encompassing seven chapters, this book begins
Type: BOOK - Published: 2020-11-26 - Publisher: CRC Press
Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's business environment. This time in the spotlight, while well deserved, has not come without a price. Businesses now
Type: BOOK - Published: 2017-05-10 - Publisher: Morgan Kaufmann
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging
Type: BOOK - Published: 2013-08-26 - Publisher: Elsevier
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.