Network security issues dicussed the with assumption that the reader has mastered the fundamental issues of telecommunication system and computer networking.

Authors Avatar

52281- Telecommunication systems - structure and applications – Network Security

________________________________________________________________________

  1. Preface

This report is written as a requirement of course 52281- Telecommunication systems - structure and applications at Department of Telecommunication, in the period of fall semester 1999, under supervision by Jørgen Nygaard.

The report is written by:

      _______________________________

  1. Adi Basuki Tedjasaputra        c991908                Chapter 1- 11, 17-18; Editor        

      _______________________________

  1. Aamir Bashir                        c991896                Chapter 12-16        

  1. Synopsis

The purpose of this synopsis is to explain and clarify the structure of this report.

 

The report consists of two parts, which are written separately and independently by the writers. The writers approach network security from different perspective to include a broader spectrum of network security issues.

The first writer tries to approach network security issues with assumption that the reader has mastered the fundamental issues of telecommunication system and computer networking. The issues discussed are:

  • Problem formulation and delimitation of network security
  • Definition of network security
  • Security system approaches
  • Introduction to Firewall
  • Secure protocol
  • Network topology and security
  • OSI network security
  • Windows NT security

Some references used by the first writer are: [3], [4], [5], [6], [7], [8], and [9]

The second writer focuses on more practical things. Some discussed issues are:

  • Network security needs
  • Security plan
  • LAN and security
  • Security and Windows NT
  • Secure electronic commerce

Some references used by the first writer are: [1], [2], [10], and [11]


  1. Table of Contents


  1. Problem – Formulation and Delimitation

There are many definitions of network security. There is no universal agreement on the definition of network security. In this writing, network security will be defined as:

An attempt or an approach to protect actively or passively a communication network from threats consciously and systematically by network manager so that the goal of the communication network can be achieved.

There is always a risk in implementing solutions to computer network security. The disadvantages and advantages of the solutions will be discussed in the computer network security approaches, which are discussed in this writing.

Connectivity & easy access are computer network primary goals. The problem with computer network security, these goals cannot be fulfilled satisfactory. Compromises that one can take into consideration when applying the computer network security are discussed in this writing.

If there is a computer network security system that protects, what should be protected? Who should protect? When? Why? Where? How? These questions are answered in short explanations in this writing since a deeper discussion of the subject is beyond the scope of this writing. The writing will emphasize primarily on the technical aspects of computer network security.

Some procedures, hardware, and software that are used to detect, prevent, and correct threats to computer network security are discussed throughout the writing.


  1. Introduction

Network security is one of many main issues in communication world. The communication technology develops so fast, that the security of communication becomes more important.

Network security is not only an issue in computer networking, but also an important issue in telecommunication. The telecommunication technology is in its converging process. In this process, security becomes an important issue not only for the users but also for the providers.

As computer network proliferates, network security becomes important. The Internet helps pushing the security technology to develop fast. The need for security becomes more and more after the explosive use of Internet. The complexity of computer network makes computer network security management more difficult. A special department that takes care of computer network security is needed in a modern organization or company. Many organizations and companies invest more in computer network security as the use of computer network in their companies and organization increase.

ANCSEC evaluation criteria [7, p.569] says that:

If the cost of recovering from security breach is less than the cost of security, reduce the security level.

This principle is true. Why should one spend much money to protect one’s PC at home if it only contains some game applications? On contrary, imagine a loss that a company can suffer from a stealing of its newest model by a competitor. This is one reason why a manager in an organization and company should take account security issues regarding their assets in data form.

Connecting to a global network has many benefits, but this causes some threats as well. Not everyone using the new Internet behaved responsibly. There is an opportunity to access other’s computers, data and resources without permission. People who do these things are known to be hackers or crackers. 

  1. Password

The Computer Emergency Response Team (CERT) estimates that over 100,000 systems on the Internet have had their security compromised by inadequate passwords. [6, p.237]

The best password would be one that is a randomly generated sequence of numbers, alphabetic characters, and special characters.

On contrary, it will be difficult for a user to memorize such a password. Some solutions for this problem:

  1. Use an encrypted password.

A user can use an easy to remember password. This solution requires a key to decrypt the password and can present the same problem as the original password. This solution can only delay the cracking of password.

  1. Change password on a regular basis.

The interval for changing the password depends on security level needed. One can change password every hour, day, week, etc. A user can also use an easy to remember password. The disadvantage of this solution is when the password is easy to guess.

  1. Use private password generator (PPG).

A user must possess a PPG for use with each attempt. The generated password is generated from the user’s unique “seed”. The seed can be a key, a card, etc.

There are two ways to crack password:

  • Password guessing.

The cracker can try to guess many combination of password using a certain method. The guessing can be done automatically by using guessing password software. The most trivial method is by using a database of possible password and combination of possible password using user’s personal data. That is why the basic rules for making a good password are important. There are also some other methods such as: brute force method, flooding method, etc; but the discussion is beyond the scope of this writing.

  • Password sniffing.

By monitoring network traffic, one can do a password sniffing. One can take certain segments of network packet where the password is usually stored.

  1. Important factors

There are 3 important factors in network security:

  • Equipment factor.

Network security can be implemented practically in software and hardware. These are called the equipments of network security. The software can be bought from a software vendor or developed by the internal user of network security. Hardware is usually bought from a trusted vendor, because of the manufacturing problem. The cost of these equipments can be high. It depends on the security level that is needed. Higher security level needs more sophisticated software and hardware with a higher cost or price. One should make a budget for security equipment according to security level needed.

  • Human factor.

In many cases, this factor is a vulnerable one. One that can breach a system is a human being. One can use many methods, software, and hardware to breach a system, but still the cracker is a human being. User(s) of the system where the security should be maintained is/are also human beings. This is why the training of security system is necessary so that the user(s) is/are aware of the importance of security in using a system. The ignorance of an individual can cost a breach for a whole system.

Join now!

The computer network security manager should be able to cooperate with the users of the network. This is crucial since without the cooperation of the users, the best security management cannot secure a network. There should be clear and strict rules regarding security.

A research in computer network security concludes that sources of threats to information security are: 75% insider, 20% physical matter, and 5% outsider [8]. It means that the users of the system are the most possible threat to computer network security.

  • Management.

To make the security system logical and easy to implement and ...

This is a preview of the whole essay