Assessment and Recommendations for Network Security, assignment help

User Generated

Snurvq

Computer Science

Description

You are the chief information technology officer at a small outpatient health care facility. The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians.

There are 25 clinical rooms. Each room is equipped with a computer. In addition, five computers are used by the administrative assistants for patients’ appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

Your report should include the following materials:

  • Existing and potential vulnerabilities and threats
  • Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats
  • Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility
  • Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Your well-written paper should meet the following requirements:

  • Be six to eight pages in length
  • Contain illustrative diagrams for the considered systems
  • Include at least five credible external references in addition to the textbook
  • Formatted according to Academic Writing and APA writing guidelines.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey, here's the assignment.

Running Head: WIRELESS NETWORK SECURITY
1

Name
Tutor
Institution
Course
Date

2

WIRELESS NETWORK SECURITY
Introduction
Local Area Network (LAN) refers to a network of the computer with computers within a

small area coverage such as universities, offices, hospitals and places of residence which have its
own interconnects and system managed locally. Many LANs are currently relying on wireless
technology. Cell phones, computers, tablets and portable computers (laptops) normally have a
wireless network which has inbuilt support.
In a Local Area Network where there are wireless connections, clients may go
unrestricted in a covered region. Wireless network has turned out to be the most popular due to
their simplicity of installation. Visitors are frequently offered the access to the internet through
the service of the hotspot.
Vulnerable threats
Security dangers are getting serious, and businesses are in the line getting exposed to
risks. As per McAfee Labs, 2016, each and every day about 157 million trials are made to allure
clients to click unsafe URLs. Roughly 353 million files which are presented to client’s network
systems. Furthermore, an extra 71 million possibly unwanted programs attempt to launch or
installation. The numbers are worrying in any circumstance. However, for business ventures, the
most concerning issue is less the danger itself than the reaction. New security arrangements
develop all an ideal opportunity to address potential vulnerabilities, but, in the case of IT and
security operations groups, dealing with those different apparatuses has turned out to be
tremendously complicated and labor-intensive. The outcome is:
Much of “firefighting": Emerging dangers and advanced targeted attacks are intended to
move beyond localized security, for example, firewalls and antivirus, and they're working out

WIRELESS NETWORK SECURITY

3

well: as per a 2016 Institute study involving 383 organizations, it takes teams 201 days, to
recognize a breach. Finding a threat in an ocean of system activity can be tremendously
troublesome, that is, they are less understanding regarding where it originated from, where it
went, or what it transformed into. Subsequently, security and IT groups are managing, dedicating
time and assets responding to crises (Kshetri, 2006).
Complexity: Compounding the issue, the instruments that security groups depend on are
the regular arrangement of point solutions which makes the job costly and more complicated. It's
hard to work immediately when you need to go through different methods, administration
consoles, and procedures to analyze issues and make a move. It's much more difficult to remain
in front of rising dangers when these arrangements don't talk to each other or share the risk
insight they watch.
Little visibility: security operations groups don't have the visibility they require across
the infrastructure. Subsequently, they regularly don't know when or where dangers are until it's
past the point of no return. Most breaches that are successful affects their targets in a matter of
minutes, while, it takes organizational entities estimate of about 256 days to recognize the
malicious attack.
Siloed security. Many organizations that have adopted the strategy of purchasing best-ofbreed arrangements found that, while it gives them great innovation, those apparatuses don’t
fundamentally communicate therefore no sharing of intelligence.
Subsequently, associations have frequently resulted in a siloed situation unequipped for sharing
information progressively. That implies that when one countermeasure detects a risk, it can't be
imparted to another countermeasure at the endpoint. In turn, this means it gives the people with

WIRELESS NETWORK SECURITY

4

malice intentions to attempt several breakthroughs into the environment through various
entryways.
Targeted attacks. Changes have been in the way in which hackers make their attempts
and attacks to infiltrate organizations in the course of the last five to eight years. Attacks have
turned out to be exceptionally focused on; they're for the most part modified, and that
customization can go down to the data they're after, the people they're focusing on and the
companies they're targeting on. The hackers and aggressors have turned out to be exceptionally
advanced in their way to deal with pursuing the data that they are searching.
Lack of focus. Consider the volumes of information that are delivered by applications
together with security occasions that get through the security framework. It's practically difficult
to think how an organization could channel through the greater part of that data and dial it down
to only those couple of occasions that are relevant to a particular attack. That absence of focus is
turning into a hindrance to making sense of how somebody got in, while they were in, what did
they do.
Methods and tools used in overcoming security threats
Without the correct procedures and instruments, managers are battling a losing fight as
they battle to examine and thoroughly comprehend the degree, nature and elements of a potential
attack. Search for apparatuses that make quantifiable results, similar to the lessening of abiding
time or diminishment of malware occasions. These mechanization devices are fundamental to
any manager’s capacity to remain on top of things, anticipate and detect dangers, and right
incursions as fast as would be.

5

WIRELESS NETWORK SECURITY
Managers, again and again, need to deal with devices and innovations from a broad
cluster of security solutions providers, driving them to accommodate reconciliation issues, for
example, visibility, compatibility similarity, and, specifically, management. That is a major
motivation behind why security manager’s work with security innovation providers that offer an
exhaustive, coordinated arrangement offer of solutions to deal with the challenges.
Managers ought to assess solutions and innovation accomplices basically on three
relevant standards to become more proactive and less reactive:
1. A coordinated pro...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags