Security Enhancing of a LAN Network using Hardening Technique
Sakshi Sharma1, Gurleen Singh2, Prabhdeep Singh3
1Sakshi Sharma, Department of Computer Science & Engineering (Networking System), Punjab Technical university, Kapurthala, India.
2Gurleen Singh, Department of Computer Science & Engineering (Networking System), Punjab Technical University, Kapurthala, India.
3Prabhdeep Singh, Department of Computer Science & Engineering, Punjab Technical University, Kapurthala, India.
Manuscript received on 07 February 2013 | Revised Manuscript received on 21 February 2013 | Manuscript Published on 28 February 2013 | PP: 175-182 | Volume-2 Issue-3, February 2013 | Retrieval Number: C0456022313/2013©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Computer Networks allows access to information and services in an organized as well as controlled manner. Security is needed to make your data immune to any kind of data breach or malicious virus attacks. Hardening is to make system hard to protect from unauthorized access and is an on-going process of providing security. As, LAN hardening is done to secure whole organization network from attacks. In this paper, model is proposed for LAN hardening to reduce security risk. LAN hardening is divided into three parts- client/server, hardware and topology hardening. By applying hardening techniques on all parts LAN is harden. In client hardening table is proposed to determine security steps of operating systems and server. In server hardening, concept of masking is introduced to protect user system and to create illusion for intruders. Hardware hardening is proposed using a Table to make whole network harder .hardening of topology can be done by choosing a best one. In this way hardening of LAN is performed.
Keywords: Hardening, Honey pot, Masking, Security
Scope of the Article: Security Service Systems