Question

In: Computer Science

Given a Local Area Network (LAN) and Wide Area Network (WAN), identify and analyze the inherent...

Given a Local Area Network (LAN) and Wide Area Network (WAN), identify and analyze the inherent weaknesses and exposures, identify control techniques commonly used to provide security of data and control over access to the network, and demonstrate how a security plan functions to safeguard against unauthorized network access.

Solutions

Expert Solution

LAN and WAN Weaknesses and exposures:

  In a LAN, the administrator has the authority to access personal details of the users on that network. A LAN administrator also has access to their internet history and computer use history. This is a serious privacy violation. Secondly, If the LAN Administer does not secure the centralised data resource in an organization properly then unauthorized users can access important data, which is a threat to security. In case of a WAN, the internal security threats are major. Viruses and corrupt files can be transmitted from one device to another in the network, which can also result into damage of the network resources.

LAN and WAN Networks security control measures:

In LANs, the most commonly used security measure is the use of Firewall softwares on the individual computer devices connected to the local area network. The Firewall provides security against the unauthorized access to the private or personal information of a computer device on a network. Secondly, passwords can be can be secured and encrypted using protocols like WPA, WPA2. In WANs, VPN technique is used to connect users to the network in order to establish a safe and private connection. VPN is the Virtual Private Network which uses encryption for data transmission. It is secure and reliable.

  

Hope it helps :)


Related Solutions

Describe topologies and concepts in the understanding, usage, and design of local area network (LAN), wide...
Describe topologies and concepts in the understanding, usage, and design of local area network (LAN), wide area network (WAN) transmission methods, and communications topologies in the design of networks: 1.Distinguish between the client-server and peer-to-peer models used to control access to a network 2.Describe various networking hardware devices and the most common physical topologies 3.Describe the seven layers of the O S I model 4.Explain best practices for topologies when working with networks and computers •The Thomas Brown Foundation is...
What is a Local Area Network (LAN)? What are the components of a typical LAN? What...
What is a Local Area Network (LAN)? What are the components of a typical LAN? What are the functions of each component?
Explain the basic differences between circuit switching and packet switching for a wide area network (WAN)....
Explain the basic differences between circuit switching and packet switching for a wide area network (WAN). Short Essay Question
growth of wireless local area network
growth of wireless local area network
Which one of the following is a local area network?
Which one of the following is a local area network?A: Two local area networks connected by a switch •B: Two local area networks connected by a UTP •C: Two local area networks connected by a switch •D: Two local area networks connected by a hub •E: Two local area networks connected by a router •F: Two computers connected by a router •G: Two computers connected by s switch •H: Two computers connected by a hub •I: Two computer connected by...
A company wants to purchase a new network file server for its wide-area computer network. The...
A company wants to purchase a new network file server for its wide-area computer network. The server costs $75,000, and will be completely obsolete in three years and worthless. If the company purchases the server, it can borrow the money at 10% and the server will be depreciated straight line to zero over three years, If the company leases the equipment they will make payments of $27,000 per year, payable at the end of each of the next three years....
Discuss the limitations and strengths of a wide area network. What are some of the security...
Discuss the limitations and strengths of a wide area network. What are some of the security challenges presented by the increased growth in wireless networking for any organization or individual today?
The objective is to design a local area network for a real or hypothetical organization of...
The objective is to design a local area network for a real or hypothetical organization of at least four subnets, with at least 100 PCs in each, using Windows and TCP/IP. hardware design: Include the following in a table: part name, description, supplier, unit cost, extended cost. Assume that all PCs were bought with NICs (do not include their costs), but no cables. Compute the total cost for all parts. Do not forget the internetworking device(s). I just need help...
Ava’s company is in the process of designing and building a new local area network to...
Ava’s company is in the process of designing and building a new local area network to support the newly expanded branch which is dedicated to handle the stock market related business transactions. A list of networking devices has been sent to you for your approval. This list includes hubs, switches, and routers. Would you approve these network devices to be used to build this new local area network? Please provide reasons to support your decision.
Suppose both the sender and receiver are in the same local area network. If the sender...
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT