Assessment Submission
Project Title
Information Security and Local Area Networks (LANs) – emerging threats and effective countermeasures
Blog URL https://thinkspace.csu.edu.au/alanj11203543/
Abstract
The setting up and utilization of Local Area Networks (LAN) is an important part of my work, so this project will look at threats to the security for information and data for LANs, of both Ethernet and wireless technology. It will identify the emerging security threats to security of computer networks in modern working environments. It will also focus on the protection and storage of sensitive data, and what new threats and security concerns being posed by both external and internal entities. This project will also look at the new countermeasures and protection from these emerging threats that can be implemented by network administrators through effective Standard Operating Procedure and processes.
Project Problem Domain
Networking security threats are a constant area of concern for network administrators. Whether they be external threats such as phishing, malware, spyware, DDoS, or viruses or internal threats, through either malicious insiders or just lax network security measures or carelessness of personnel. Any of these threats provide a source of danger for data security within local area networks.
Questions to research include
– What are the main and new threats for data security for LAN administrators?
– What additional threats are involved with wireless LANs?
– How can network administrators counteract these threats?
Background Description
My area of work within the Defence Department involves setting up small LANs, involving for engineering data analysis events. The protection, integrity and security of data inside these networks and the data transfer between networks is an essential part of this setup.
Providing a secure networking environment is essential especially when dealing with classified and sensitive data. Ensuring the data and information is safely stored and protected from outside and internal possible threats is central to the operation of the engineering events.
Ethernet LANs have traditionally been the main set up that implemented in my workplace, but wireless networking is now being utilized. So any additional threats proposed to these WLAN and their implementation will be analysed and assessed, with effective countermeasures proposed.
Project Aim / Objectives
This projects objective is to study Local Area Networks, focusing on
- Latest security threats and trends to data security
- Ethernet and Wireless networks,
- Data storage and transmission
- Identify the latest and most effective security countermeasures available to combat the emerging security threats for LAN / WLANs.
Deliverables / Outcomes
The outcome of this project will be a clearly research project providing
- A discussion of the main and new threats for network LAN administrators to be aware of.
- Adapting and using wireless network technology for LANs and the associated threats
- A list of procedures, policies and possible counter measures to implement
This will ensure all the data and information is secured transmitted and stored inside the local area networks.
Resources / References
21 papers currently sourced from CSU Primo site that provide good information. 19 are rated Q1 or Q2.
2 don’t have any current Q rating but appear to provide quality information.
Initial ones that look quite useful
Lindroos, S., Hakkala, A., & Virtanen, S. (2021, Oct 9). A systematic methodology for continuous WLAN abundance and security. Computer Networks. doi:https://doi.org/10.1016/j.comnet.2021.108359
Liu, L., Cao, M., & Sun, Y. (2021, Dec 21). A fusion data security protection scheme forsensitive E-documents in the open network environment. PLOS ONE. doi:https://doi.org/10.1371/journal.pone.0258464
Machado de Sousa, E., & Shahzad, A. (2021, Oct 19). Data Loss Prevention from a Malicious Insider. JOURNAL OF COMPUTER INFORMATION SYSTEMS. doi:https://doi.org/10.1080/08874417.2021.1980748
Tao, X., Kong, K., Zhao, F., Cheng, S., & Wan, S. (2020, Nov 10). An efficient method for network security situation assessment. International Journal of Distributed. doi:DOI: 10.1177/1550147720971517
Wang, Y., Smahi, A., Zhang, H., & Li, H. (2022, Jan 19). Towards Double Defense Network Security Based on Security Based on Multi-Identifier Network Architecture. Sensors. doi:https://doi.org/10.3390/s22030747
Zhan, K. (2021). Design of computer network security defense system based on artificial intelligence and neural network. Journal of Intelligent & Fuzzy Systems. doi:DOI:10.3233/JIFS-189794
Zolkin, A., Abdulmukminova, E., Malikov, V., & Lepshokova, A. (2020, Nov 21). Problems of personal data and information protection in corporate computer networks. IOP Science. doi:doi:10.1088/1757-899X/1047/1/012102
Provide a brief description as to how does the selected project align with your course or specialisation?
I do not have a specialisation in my Masters of Information Technology, but the topic of data security and networking is of interest to me and relates to my current work.
I work within an Engineering unit within the Defence Department and my roles include data security and networking /lab manager.
Our unit also involves operating internal local networks, predominantly Ethernet LAN, but recently have been expanding using wireless networking. My role involves the security of the hardware and software involved and storage of the data securely. Staying up to date on security concerns in these areas and the issues is an important part of my role and I am keen to further my knowledge in this area.