"Securing Wireless Access" Please respond to the following:

Computer Science
Tutor: None Selected Time limit: 1 Day

Based on the risks you have identified in Part 1 of this discussion, suggest the approach you would use to mitigate those types of risks. Justify the use of your suggested approach.

Feb 2nd, 2015

It is important to apply layered approach in order to secure wireless communication. These measures should be taken in order to secure wireless access.

(i) Properly Configure all authorized access point and change default passwords.

Many wireless devices comes with default configuration, that is known to attackers making it vulnerable to attack.  Devices that are miss configured can also be easy target of attackers as they will affect functionality of that device.

(ii)Use strong encryption and strong authentication for wireless network.

Strong encryption can make it hard for attackers to intercept and listen network traffic, while strong authentication will make it difficult for attackers to access network

(iii)Allow only specific computers to access network resource. Use role based access to network resources.

Role based access to network resource will increase security of network, specific people will only be able to see and access specific network resources.

(iv) Periodic Audit Wireless network, area , coverage, traffic analysis, can help reducing the risk of man in middle and denial of service attacks.

Periodic audit of wirless network and analysis of log files will not only secure wirless communication but also will helo detect any attempts of access to wireless resources.

(v) Use signal hiding techniques to avoid getting located by attackers.


Feb 2nd, 2015

Studypool's Notebank makes it easy to buy and sell old notes, study guides, reviews, etc.
Click to visit
The Notebank
...
Feb 2nd, 2015
...
Feb 2nd, 2015
May 24th, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer