Masters Theses
Date of Award
8-1989
Degree Type
Thesis
Degree Name
Master of Science
Major
Computer Science
Major Professor
T. H. Duningan
Committee Members
William J. McClain, Jeffery D. Case
Abstract
In the early years of computers, not much, if any, consideration was given to connecting computers to each other. Computers were initially linked to each other via dedicated links, and these could be controlled. But as time and technology changed, several aspects of computers and networking also changed. Still, there was no need for concern because users had the ability to send/receive data via remotely submitted jobs to the computers. Users still did not have true interactive access to the computers. However, technology pressed on and the capabilities of the computers and networking provided innovative features for the users. Now the users could access the computers from almost anywhere at anytime via true interactive high-speed data circuits. Also, users could share data with other users within the same local area or facility. Thus, the local area network (LAN) was established and became widely recognized and accepted. The high visibility that the LAN received raised several concerns and problems.
Presented herein are security concerns and problems that need to be examined before and after a LAN is purchased and installed for use. Some cases described within this document may not actually be solvable, thus recommendations will be made to address these types of situations. The unsolvable situations may be due to the lack of technical expertise in development of both hardware and software. The growth and uncanny acceptance of the LAN has caused technology to be pushed to the limit. With so much hardware, software, and vendor support available to users, the administrative, configuration, and IV security controls on the LAN have been neglected. Finally, due to successful break-ins of several computers by hackers via LANs, security controls are now an important aspect of networks. Most security controls can be implemented on LANs by either physical, technical or adminstrative methods. Discussions of these controls are presented in detail, as are views on networking standards. Views on these standards will be presented as they pertain to networking protocols already established. Methods will be discussed that can be used to further enhance security to local area networks.
Recommended Citation
Pfleger, Chad Matthew, "Local area networks : security problems and concerns. " Master's Thesis, University of Tennessee, 1989.
https://trace.tennessee.edu/utk_gradthes/13049