KEMBAR78
CyberSecurity - LAB 1 | PDF | Computer Network | Network Switch
0% found this document useful (0 votes)
15 views4 pages

CyberSecurity - LAB 1

The document outlines various network resources such as switches, routers, hubs, and firewalls, along with their definitions and associated security issues. Each resource is detailed with specific vulnerabilities and recommended solutions to mitigate risks. The focus is on enhancing network security through proper configuration and management of these devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

CyberSecurity - LAB 1

The document outlines various network resources such as switches, routers, hubs, and firewalls, along with their definitions and associated security issues. Each resource is detailed with specific vulnerabilities and recommended solutions to mitigate risks. The focus is on enhancing network security through proper configuration and management of these devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Security 20CS54

CYBER SECURITY
LAB 1

Identify network resources like switches, router, hub, firewall and security
issues for the same

SOLUTION:

The Network resources are :

1. Switch
2. Router
3. Hub
4. Firewall
5. Access point
6. Servers
7. Gateway
8. Modem
9. Network Interface Card(NIC)
10.VPN(Virtual private Network)
11.Load Balancer
12.Intrusion Detection System(IDS)

SWITCH:

Definition: A networking device that connects devices on a computer network by


using packet switching to forward data to the destination device.

Secuirty Issues:
1. MAC Flooding
 Issue description: Attackers can flood the switch with fake MAC
addresses, causing it to send data to all ports.
 Solution: Implement port security and rate limiting
2. VLAN Hopping
 Issue description: Improper VLAN configuration can allow attackers
to send packets to unauthorized VLANs.
 Solution: Proper VLAN configuration and tagging
3. Port Security

Ranjitha TN, Lecturer, Department of Computer Science Engineering Page 1


Cyber Security 20CS54
 Issue description: Lack of port security can lead to unauthorized
devices connecting to the network.
 Solution: Limit the number of devices per port
4. Spanning Tree Protocol (STP) Attacks
 Issue description: STP can be manipulated to alter the network
topology and cause disruptions
 Solution: Use STP security features (e.g., BPDU Guard)

HUB

Definition: A basic networking device that connects multiple Ethernet devices,


making them act as a single network segment.

Security Issues:

1. Lack of Security Features:


 Issue description: Hubs do not filter or secure traffic, making all
connected devices susceptible to sniffing.
 Solution: Replace with switches where possible.
2. Broadcast Traffic:
 Issue description: All data packets are sent to every device on the
network, increasing interception risk.
 Solution: Use network segmentation.

Router

Definition: A networking device that forwards data packets between computer


networks, creating an overlay network.

Security Issues:

1. Default Credentials:
 Issue description :Many routers come with default usernames and
passwords that are easily exploitable.
 Solution: Change default usernames and passwords.
2. Outdated Firmware:
 Issue description Failure to update router firmware can leave
vulnerabilities open to exploitation.
 Solution: Keep firmware up-to-date.
3. Weak Encryption:

Ranjitha TN, Lecturer, Department of Computer Science Engineering Page 2


Cyber Security 20CS54
 Issue description :Using weak encryption protocols (e.g., WEP)
makes it easier for attackers to intercept data.
 Solution: Use strong encryption protocols (e.g., WPA3).
4. Remote Management:
 Issue description :Enabled remote management interfaces can be
accessed by attackers if not secured.
 Solution: Limit access and disable if not needed.
5. Open Ports:
 Issue description :Unnecessarily open ports can be entry points for
attackers.
 Solution: Close unnecessary ports.

Firewall

Definition: A network security device that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.

Security Issues:

1. Misconfiguration:
 Issue description :Incorrectly configured firewalls can allow
unauthorized traffic or block legitimate traffic.
 Solution: Ensure proper configuration and regular audits.
2. Policy Bypass:
 Issue description :Complex rules and policies might be improperly
enforced, leading to security loopholes.
 Solution: Simplify and regularly review rules.
3. Outdated Software:
 Issue description :Firewalls that are not updated may have
vulnerabilities that can be exploited.
 Solution: Keep software up-to-date.
4. Logging and Monitoring:
 Issue description: Insufficient logging and monitoring can delay
detection of breaches.
 Solution: Implement robust logging and monitoring.

Ranjitha TN, Lecturer, Department of Computer Science Engineering Page 3


Cyber Security 20CS54

Ranjitha TN, Lecturer, Department of Computer Science Engineering Page 4

You might also like