Six months after your initial posture assessment, the credit
union’s manager contacts you to
conduct a follow-up security audit. He mentions that his networking
team followed your
suggestions for improving the LAN and WAN security. However, since
then, several wireless
components have been added to the network, including an access
point at each of its two
locations. These access points allow employees to connect with the
LAN and another access
point at each of its locations designated for customer access. The
manager doesn’t even know
if wireless security measures have been implemented, much less
whether any measures
that might have been implemented are as secure as
possible.
Describe at least three separate techniques that could be used to improve wireless LAN security.
Answer)
Information security is very important in today's world where
computers and networks handle all data. This malicious activities
such as hacking a data leakages are prevalent and are abundant in
activities by the attackers who perform attacks and try to access
unauthorized or secure content from computers or networks. There
are separate techniques that could be used to improve wireless LAN
security such as:
Wired Equivalent Privacy (WEP): is an old encryption standard which
is used to overcome security threats by encrypting the information
which is transmitted over the air such that the receivers having
the correct encryption key should be able to decrypt the
information which was encrypted by a key.
WPA/WPA2 (WI-FI Protected Access) is an improved version over the
WEP which uses Temporal Key Integrity Protocol (TKIP). This method
uses a temporal encryption key that is regularly renewed which
makes it more difficult to steal the key. A more robust hashing
mechanism also improved the data integrity.
Wireless Intrusion Prevention Systems/Intrusion Detection Systems
uses the radio frequency (RF) levels and detects the rogue access
points or ad hoc networks to regulate network access. Latest tools
and features include to visually represent the network area along
with potential threats and have automatic classification
capabilities to identify the threats.
Six months after your initial posture assessment, the credit union’s manager contacts you to conduct a...
First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....
I have this case study to solve. i want to ask which
type of case study in this like problem, evaluation or decision? if
its decision then what are the criterias and all?
Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...