Download ppt - LAN Security

Transcript
Page 1: LAN Security

LAN SECURITYBY

SYED UBAID ALI JAFRI

Information Security ExpertCEOUJ Consultant & Solution Providerhttp://www.ujconsultant.com

Page 2: LAN Security

CONSIDERATIONS

•INTRODUCTION TO LAN•WHAT TO KNOW ABOUT LAN•WHY SECURITY?•THREATS•COUNTERMEASURMENT•MINIMIZING RISK•EVALUATE PERFORMANCE

Page 3: LAN Security

INTRODUCTION TO LAN

Any network that is connected on a same subnets lies under the category of LANLAN Share resources of computer which includes:1) File Sharing2) Voice chatting3) Message Sending4) Desktop Sharing

Page 4: LAN Security

WHAT TO KNOW ABOUT LAN

•Information about host•Devices that are connected on the subnet•IP Address of the system•Remote Services•Events Logs

Page 5: LAN Security

WHAT TO KNOW ABOUT LAN

Information about host

Page 6: LAN Security

WHAT TO KNOW ABOUT LAN

Devices that are connected on the subnet

Page 7: LAN Security

WHAT TO KNOW ABOUT LAN

IP Address of the system

Page 8: LAN Security

WHAT TO KNOW ABOUT LAN

Remote Services

Page 9: LAN Security

WHY SECURITY

Any medium whether it is wired or wireless must have some strong security consideration.Using LAN, security can be helpful for the user who have a large network connected on a LAN, they must go through the process of analysis that interacts with LAN

Page 10: LAN Security

THREATSFollowing are the list of threats that a LAN Network faces:

•MAN IN THE MIDDLE ATTACK•SMURF ATTACK•IP SPOOFING•DENIAL OF SERVICES•ARP POISONING

Page 11: LAN Security

THREATSMAN IN THE MIDDLE ATTACK:

The man-in-the middle attack intercepts a communicationbetween two systems.

Page 12: LAN Security

THREATS

SMURF ATTACK

The Smurf attack is a way of generating significant computernetwork traffic on a victim network.

Page 13: LAN Security

THREATS

IP SPOOFING

IP address spoofing or IP spoofing refers to the creation ofInternet Protocol (IP) packets with a forged source IP address,called spoofing.

Page 14: LAN Security

THREATS

DENIAL OF SERVICES

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users

Page 15: LAN Security

THREATS

ARP POISONING

ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether

Page 16: LAN Security

COUNTERMEASUREMENTS

•Denying Unusable services•Checking people currently connect with this network•Closing Default operators of windows•Saving external resources•Making Log files•Updated Virus Definitions

Page 17: LAN Security

COUNTERMEASUREMENTSDenying Unusable services

RUN>Services.mscClose these services

Automatic UpdatesLive UpdateTelnet

Page 18: LAN Security

COUNTERMEASUREMENTS

Checking people currently connect with this network

Page 19: LAN Security

COUNTERMEASUREMENTS

Closing Default operators of windows

Page 20: LAN Security

COUNTERMEASUREMENTSHKLM\Software\Microsoft\Windows\CurrentVersion\Policies\ExplorerHKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Operating system Default settingWindows 7 0x91

Windows Server 2008 0x91

Windows Vista 0x91

Windows Server 2003 0x95

Windows XP 0x91

Windows 2000 0x95

Windows 95/98 0x95

Page 21: LAN Security

COUNTERMEASUREMENTSMaking Log files

RUN > eventvwr

Page 22: LAN Security

MINIMIZING RISK•Making Remote Connectivity disabled•Services Like Telnet, SSH, VNC should be stopped forcefully•Changing Values from Registry•Releasing and Renewing IP Addresses

Page 23: LAN Security

MINIMIZING RISK•Services Like Telnet, SSH, VNC should be stopped forcefully

•Net stop telnet

•Net start telnet

Page 24: LAN Security

MINIMIZING RISK•Releasing and Renewing IP Addresses:

•Ipconfig /release

•Ipconfig /renew

Page 25: LAN Security

EVALUATE PERFORMANCE

By Default Windows Xp, 7 , Vista enble the services that are not used under he scope of a home userOperating system performance can be cutomized from1) Windows Services.2) Windows Registry3) Windows Effects4) Monitoring Services

Page 26: LAN Security

EVALUATE PERFORMANCE

Page 28: LAN Security

Recommended