Preview

Audience Memo

Good Essays
Open Document
Open Document
747 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Audience Memo
To: Don Big
From: R Brann
Date: November 4, 2012
Subject: Disabling the SSID Manual

This memo’s purpose is to inform you on my instruction manual on how to disable the Service Set Identifier (SSID) on a Fios Router. All field technicians and network technicians should be able to walk a customer through disabling the SSID on their router. This manual will provide the customer with step by step instructions on disabling the SSID without the help of a field or network technician. By having the customer complete this we are helping the customer increase the security of their wireless network. This will save the technician time and the company money.

The primary audience of my instruction manual is Fios internet customers. They for the most part have a high school diploma with some having a bachelor’s degree. Fios customers have various jobs from construction worker, school teacher, small business owner, and college student. The average customer does not know much about the SSID or why disabling it is important. They just want to be able to connect to the internet with the least amount of steps. It is important that we get the customer to understand that if they disable the SSID it makes harder for would be attackers to access their network. Most attackers would just move on to an easier network to break into. I would say that about ten percent of the customers would read this instruction manual. People might say that is not a lot but if those ten percent complete this task then they will harden their network and lessen the chances of their network being attacked.

Secondary audience for the manual is field and network technicians. Most field and network technicians have a high school diploma and a very few have associates and bachelor degrees. All technicians know what the SSID is but don’t know why they should disable it after the wireless network is setup. On average most of the field technicians have a telephone back ground and not a

You May Also Find These Documents Helpful

  • Best Essays

    Patton-Fuller Rfp Cmgt554

    • 4696 Words
    • 19 Pages

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital’s current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas such as networking architecture design and the future proofing of the design for speed, accuracy, and security of the system shall be discussed as part of this RFP. Special consideration was given to the sensitive nature of the security surrounding patient information while proposing changes.…

    • 4696 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Step4 – After successful login you can easily change the settings of the router using the web interface.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It241 Final

    • 446 Words
    • 2 Pages

    In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 assignment

    • 378 Words
    • 2 Pages

    Service Set ID (SSID)- Is a sequence of characters that uniquely names a wireless local are network. An SSID is sometimes referred to as a “network name” This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Cloak the ssid so that no one will pick up your network while they are scanning. Basically implements a closed network…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    Users will report known misuse or abuse of the wireless network or associated equipment immediately to your local SST or ITT personnel.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Of the many ways to protect your WLAN you should start with changing all the default passwords on all your equipment. If you have a small business without many users and devices a MAC filtering system is a good choice. MAC filtering is where every MAC address for all devices allowed on the system are listed and if a device tries to get onto the system that is not on the list it will not be allowed. That is why smaller systems can keep up with this type of format.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Eng/221 Week 4

    • 621 Words
    • 3 Pages

    The user manual is easy for the user to navigate through and is easy to understand for anyone who is 13 or older. There are diagrams and pictures for users to better understand things such as inserting the battery and navigating through different screens. One thing that is very beneficial for the reader is a picture of the buttons and what each one does. This manual does have some technical terms when it comes to navigating through the screens but the pictures make it easier for the reader to be able to follow along. There are also technical terms in the words but the manual is explains what the technical terms means and how to use them, Overall, this manual is great for audiences but it is a very long manual making it great for if you want to know how to do individual things here and there.…

    • 621 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISM 4220

    • 2410 Words
    • 10 Pages

    MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.…

    • 2410 Words
    • 10 Pages
    Good Essays
  • Good Essays

    There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once all the information is ironed out I will position each specific user group based on their role for eligibility. I will ensure all wireless and mobile devices are company owned. Write a policy against transferring their personal number to their company owned mobile device. This will help in keeping the company wireless environment protected and secure. Policy will also cover the health of the devices. Maintaining it for a year contract. A policy for storing inappropriate photographs/ images is prohibited. I will also include policies against texting and driving unless you use a hands free device…..but express the usage and a risk in such an event or situation is needed.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays