z-logo
open-access-imgOpen Access
Identifying Vulnerable Security Practices In Small Scale Computer Networks
Author(s) -
Gary Steffen,
Iskandar Hack
Publication year - 2020
Publication title -
2007 annual conference and exposition proceedings
Language(s) - English
Resource type - Conference proceedings
DOI - 10.18260/1-2--2619
Subject(s) - computer science , computer security , the internet , popularity , scale (ratio) , internet security , network security , internet access , information security , vulnerability (computing) , world wide web , internet privacy , security service , psychology , social psychology , physics , quantum mechanics
Twenty years ago, the Internet and networking was technology only accessible to large corporations, educational institutions and researchers. In today’s information marketplace highspeed Internet reaches into the smallest businesses and households. To extend Internet connectivity, individuals purchase small routers and wireless access points from local electronic stores. This allows sharing of the Internet connection with multiple employees and family members simultaneously. Improper installation of such data equipment creates a vulnerability to personal information and security. In an effort to better serve this growing market, student training has been implemented in the security of small scale networks and routers. Traditional security training has typically concentrated on virtual simulation and larger scale routers/firewalls. Small inexpensive routers/firewalls and access points can be a powerful tool, which possesses many of the same security principles as their more expensive counterparts. A majority of students already have this equipment available in their own homes because of the popularity of DSL and Cable Internet access. Students, many times, disconnect the principles of home security from that of corporate or large scale network security. They learn the practice yet fail to implement this knowledge into their own life. Even the smallest leak of information may result in catastrophic circumstances. This paper will discuss the use of small scale routers and access points in the training of a security specialist in a Computer Engineering Technology program. Examples will be given on how these small inexpensive communication devices can be used to demonstrate extensive security principles. The result is a personal connection for the student to exercise good security practices on a daily basis.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom