Preview

Unit 5 Wireless Security Report

Good Essays
Open Document
Open Document
11068 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Wireless Security Report
MADS6638 Unit 5 Wireless Security

Objectives

By the end of this unit, the participant will be able to:

* Understand the need for wireless security * Check wireless connectivity from a public area * Understand war chalking and evil-twin intercept * Recognize the setting up of a wireless network in the workplace * Describe packets and how they work * Change the IP address and password for the router/switch * Enhance wireless security by encoding WEP and changing the key size * Enable the MAC filter and limit transactions * Decide when to turn off wireless capability * Turn off the service set identifier name * Disable remote configuration * Use a wireless network range extender * Create
…show more content…

A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.

VPNs may also be appropriate in an academic setting. Although most dorms are networked, universities employ stringent firewall rules to restrict students from using their computers as a server to the outside world. The Internet control message protocol (ICMP) packets and other types of control packets are disabled on student-used networks. It appears the only way to do gaming is through a website or through VPNs to avoid affecting the servers/configuration/ports and data flow. A VPN can go in front of a firewall or behind it. For example, a VPN router/switch can go in front of the firewall on a
…show more content…

He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.

The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.

Separation of


You May Also Find These Documents Helpful

  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    1. One possibility for connecting two locations over a large distance is through the use of Virtual Private Networks over an Internet connection. Why is this type of network cost effective? What connectivity is required for both parties? Use your textbook and the Internet to research your…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Team A is proposing a thorough upgrade to Riordan’s phone and data networks. Our proposal will cover a description of the new system, its components and benefits to Riordan, as well as explain the requirements driving the need for the upgrade. We will cover the information used in the phone and data upgrades and discuss any security and ethical concerns of the system. We will be providing Riordan with diagrams of information flow and system components and business process changes incurred with the implementation of the new system. We will review the web and mobile access elements of the new phone and data networks and how the system will be acquired and maintained. We will discuss the strategic role the system will play in the company and certain requirement driving the projects creation and use. Overall, we will present a compelling and convincing presentation, justifying the costs and changes associated with upgrading Riordan current voice and data networks.…

    • 4597 Words
    • 19 Pages
    Better Essays
  • Satisfactory Essays

    NOTE: Use Carriage Returns and Page Breaks as needed to prevent table contents from extending across page boundaries.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A viable solution for a situation with several remote offices is a VPN (virtual private network). VPN software enables private information to be shared over the public network while being encrypted. Aircraft Solutions has many groups and users that need different levels of access to the internal network. Clients need access to the company website, employees need to be granted different levels of access to certain facets of the internal network. With all of these parties accessing the business, the VPN gives security to those whom feel that the information they are viewing not be available to others.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 166 Words
    • 1 Page

    Remote access can be made available to senior management and executives to help them access their work when not in the office. This can be done via VPN. VPNs can allow users needing remote access to securely access IT resources without being physically connected to the network. It is secured with encryption by tunneling through an internet connection. All that is needed is VPN software, appropriate protocols (i.e. IPSec), and encryption.…

    • 166 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Many companies inform their IT’s as to who will receive access to the network and what type of equipment they will be using. It could be from an older vpn that needs a software package to run on a trustworthy network, which would be safe to run from a home PC or smartphone. No network is ever 100% secure. Companies should access their needs and risks, and then write their acceptable use policies. Some companies may find it easier to rent a secure cloud app rather than installing in-house software, but this may not meet all of the company’s needs.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Plainly, a VPN is just a network of computers that are all connected securely despite the fact that they’re in different geographic locations, and could potentially be using different connection methods. The largest attraction to a VPN is all of the involved computers are afforded secure connection to one another. Another great benefit to a VPN is that all of the involved computers are effectively on the same network. Users can communicate as if they were right next to one another, plugged in to the same router. Additionally, the traffic to and from these machines is encrypted.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pervasive influence of information technology with penetration of computers and communication in all aspect of the workplace, it is important for a organization to keep up with the advancement of technology in the criminal justice and security agency. Technology is playing a major role in how criminals for committing crimes, which is why there has been a increase in cyber crimes because a criminal…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When accessing the company’s network (on-site or remotely), employees must limit personal computer and internet usage only during their allocated break and lunch times. During these times, internet and computer usage must be appropriate. In the case there is reasonable suspicion that an employee is in violation of this policy, the company holds the right to monitor computer activity. The company holds the right to terminate an employee based on information found after monitoring their workstation. If the offense does not deem a termination, computer training will be conducted for the employee to reestablish comprehension of proper use of company resources.…

    • 945 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Byod Pro's and Con's

    • 2327 Words
    • 10 Pages

    The paper will be to identify most of the risks associated with companies allowing personal devices in the work place to access company information. I will also demonstrate the downside of the BYOD policy and the affects to the company and the employee.…

    • 2327 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Team B and associates were task by Riordan to analysis Riordan’s WAN and add a wireless Network to Riordan Manufacturing, also to analyze and update Riordan’s Internet security in each of the locations and provide documentation for security policies and procedures. What is a wireless network and what are the benefits of going wireless. With the current wireless technology, Wi-Fi is everywhere; one can connect to the Internet by going to coffee houses, airports, hospitals, hotels, and homes. Businesses can stay connected to their coworkers and customers without being tied…

    • 4151 Words
    • 17 Pages
    Better Essays
  • Good Essays

    We pride ourselves in security, prevention and education. The education is for the users of the network in order for them to understand how to operate the network and to identify possible vulnerabilities. Prevention aids the security of the network in order to limit attacks that it has to prevent. In this day and age security of an organizations network is very important. James Lyne (Lyne, 2013) the Technology Strategist of Sophos states that network security technology has rapidly been changing in a very dramatic form. The growing use of personal devices, SaaS (Software as a Service) and Mobile VPN is just a few of the devices that have changed dramatically in the area of network…

    • 1032 Words
    • 5 Pages
    Good Essays