Question

can you please solve this answer 1) identify and describe the threats, vulnerabilities and attacks on...

can you please solve this answer 1) identify and describe the threats, vulnerabilities and attacks on Wireless Local Area Network (LAN), describe the scenario of each attack and its effect on wireless network performance. Also, clarify the attacks by diagrams)

(Hint: identify and describe the threats, vulnerabilities and attacks on your selected wireless network, describe the scenario of each attack and its effect on wireless network performance. Also, clarify the attacks by diagrams)

2) Suggest security services and mechanisms to countermeasure the attacks. Provide a detailed description for each service and mechanism. Then, provide a clear diagram of your security architecture of wireless network.

(Hint: identify the security service that could detect/prevent the attack, then describe mechanisms to implement the identified services.)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hi,

Please find some of the threats and vulnerabilities on WLAN.

1)

Bogus Access Point: Installing a fake or Bogus Access point on the network. Attack is to fool users with fake access points.

Denial of service attack: DoS occurs when hacker continually sends to a targeted access point or network with bogus requests.

Network injection: attacker injects bogus networking re-configuration commands that affects network devices such as routers, switches etc. With this kind of attack, A whole network can be brought down by the attacker.

Man-in-the-middle attack: Eavesdropping

MAC address spoofing or Identity Threat / Session Hijacking. This kind of attack allows a machine to pretend it as another MAC address that the attacker desires to spoof. Attackers can use spoofed frames to redirect legitimate traffic and corrupt address tables.

2)

Wireless network auditing is an effective countermeasure for the attacks. It is an important part of WLAN security policy.

Use of anti-virus software and firewall protects the devices in the network from the attacks.

Use of encryption: An effective way to secure wireless network from attackers is to encrypt

communications over the network.

Use of up-to-date software and network devices minimizes the risk of attacks.

Change all default passwords for the routers and default settings to network devices.

Add a comment
Know the answer?
Add Answer to:
can you please solve this answer 1) identify and describe the threats, vulnerabilities and attacks on...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1) identify and describe the threats, vulnerabilities and attacks on Wireless Sensors Networks (W...

    1) identify and describe the threats, vulnerabilities and attacks on Wireless Sensors Networks (WSN), describe the scenario of each attack and its effect on wireless network performance. Also, clarify the attacks by diagrams) (Hint: identify and describe the threats, vulnerabilities and attacks on your selected wireless network, describe the scenario of each attack and its effect on wireless network performance. Also, clarify the attacks by diagrams) 2) Suggest security services and mechanisms to countermeasure the attacks. Provide a detailed description...

  • 1. a. Upon a risk analysis on a company's site network, some threats are identified. These include threats from malicious code (i.e. virus, worms and Trojan horse) and threats from denial of...

    1. a. Upon a risk analysis on a company's site network, some threats are identified. These include threats from malicious code (i.e. virus, worms and Trojan horse) and threats from denial of service (DoS) attacks. To address these threats, an administrator in the company, Bob, has suggested using a firewall to control the access of the site network from the Internet. i. Contrast the three types of malicious code, virus, worms and Trojan horse. ii. There are three types of...

  • Attacks: Passive – attempt to learn or make use of information from the system that does...

    Attacks: Passive – attempt to learn or make use of information from the system that does not affect system resources • Active – attempt to alter system resources or affect their operation • Insider – initiated by an entity inside the security parameter • Outsider – initiated from outside the perimeter Threat Consequences Unauthorized disclosure is a threat to confidentiality •Exposure: This can be deliberate or be the result of a human, hardware, or software error •Interception: unauthorized access to...

  • Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...

    Peer Reviewer: Describe the problem in your own words. What is the scope? What is the severity? Is the problem statement objective? Explain why or why not. Describe the problem statement quality and provide one suggestion for improvement. How was the problem measured? Explain the derivation of the metric and the baseline and the unit of the metric. Make a comment on the quality of the metric used, providing one alternative or additional metric for the problem. List the factors...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • Please answer the following questions: 1) Describe the main functions of a computer network (12 marks)...

    Please answer the following questions: 1) Describe the main functions of a computer network (12 marks) 2) In your own words, compare the three types of files: directories, ordinary files, and special files. Explain what would happen if a user modified a directory file (10 marks) 3)What are the advantages of having a Windows system using the menu-driven interface, instead of typing commands. Give at least one example where having menus is an advantage (6 marks) 4) Identify at least...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Please answer all questions! Thank you! CP 1-1 The following list covers many of the types...

    Please answer all questions! Thank you! CP 1-1 The following list covers many of the types of financial transactions. Notice that each transaction has an equal and offsetting effect on the accounting equation. Types of accounting transactions ASSETS = LIABILITIES + STOCKHOLDERS EQUITY (+) (+) (+) (+)(-) (-) (-) nimi wooo III (+) (-) (+)(-) (+)(-) Required: Using the appropriate accounting equation, study the following transactions and identify the effect of each on assets, liabilities and stockholders' equity, as applicable....

  • You work for EGS Testing Solutions; your company is involved in testing related to access control...

    You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT