Preview

IT/241 Wireless Security

Good Essays
Open Document
Open Document
391 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT/241 Wireless Security
Someone gaining unauthorized access to my network is something I would try to prevent at all costs. Unfortunately, even the best security measures can be compromised which allows someone to cause unspeakable harm to the devices connected. Out of the list of potential security breaches, Script Kiddies would be the one that could cause less damage than anything else. These hackers are typically people who know little about computers and may have not used them for very long. The script-kiddies download one of the most recently developed scripts and run them against targets on the Internet until they find a vulnerable target (Internet Security Systems, n.d.). These flaws are typically found quickly and repaired. These “hackers” are typically younger kids who like the power hacking give them, and typically are not looking to inflict harm to a network. While no attack is good, script-kiddies are the easiest to deal with on a network.
With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person

You May Also Find These Documents Helpful

  • Good Essays

    |MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Better Essays

    These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management.…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    planned expansion into the east coast. One of the threats identified was the vulnerability of the…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    What are the major security threats on my network and computers connected to the network?…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    [242.1] Select and use appropriate methods to minimise security risk to IT systems and data…

    • 793 Words
    • 4 Pages
    Good Essays