Local Area Network Security

Protecting your local area network (LAN) is important. Your LAN is all the computers and equipment that are connected by Ethernet cables to a switch which is connected to a router and modem which in turn are the gateway to the Internet. Computers on the LAN can talk to one another without stepping out the gateway door to the Internet. However, whenever any of the devices on the LAN access the Internet, they are communicating through the router and modem to computers on the Internet. (See the attached image of a LAN.)

The key access point between the LAN and the Internet is the router, also called the gateway. The router contains special software called a firewall. The firewall specifies what types of communication are allowed in and out through the router/gateway. When you read web pages and download resources, this information is traveling from the Internet through the router to your computer. Since electronic communication happens silently out of common vision, we may not be aware just how many criminals are also knocking at the door. Most server router/gateways receive door knocks from hundreds if not thousands of Cyber-criminals EVERY DAY! One thief with a crowbar can break into your house. However, Cyber-criminals do not really break anything to get into your computers. Instead, they are constantly looking for an open or unlocked door. Imagine a thousand masked criminals around your house with no strength to break a window, but they wait for an open door. That is Cyber-crime.

To protect the LAN you must understand how your LAN can be harmed. The following are all dangerous for your LAN:

  • Accidental harm to equipment that is not properly housed
  • Malicious harm to equipment that is not securely housed
  • Electrical harm to equipment that is not surge and UPS protected
  • Water or dust damage to equipment stored in poor conditions
  • Heat damage to equipment in closed spaces
  • Entrance of viruses through a CD (Compact Disk) or USB (Universal Serial Bus) drive plugged into the computer
  • Entrance of viruses through email, a website, or a download from the Internet
  • Entrance of viruses through malware software installed on the computer
  • Cascading damage from failed parts that were not replaced in timely fashion.