Six months after your initial posture assessment, the credit union’s manager contacts you to conduct a follow-up security audit. He mentions that his networking team followed your suggestions for improving the LAN and WAN security. However, since then, several wireless components have been added to the network, including an access point at each of its two locations. These access points allow employees to connect with the LAN and another access point at each of its locations designated for customer access. The manager doesn’t even know if wireless security measures have been implemented, much less whether any measures that might have been implemented are as secure as possible.
Describe at least three separate techniques that could be used to improve wireless LAN security. Among these, which do you recommend for the employee WLANs at each location, and which do you recommend for the customer WLANs? Why might the two types of WLANs differ in the method of secure transmission they use? Finally, how can the credit union’s network administrators ensure that customers who bring their smartphones or laptops into the bank can access the customer WLAN but cannot access the employee WLAN?
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.