"Securing Wireless Access" Please respond to the following:

label Computer Science
account_circle Unassigned
schedule 1 Day
account_balance_wallet $5

Based on the risks you have identified in Part 1 of this discussion, suggest the approach you would use to mitigate those types of risks. Justify the use of your suggested approach.

Feb 2nd, 2015

It is important to apply layered approach in order to secure wireless communication. These measures should be taken in order to secure wireless access.

(i) Properly Configure all authorized access point and change default passwords.

Many wireless devices comes with default configuration, that is known to attackers making it vulnerable to attack.  Devices that are miss configured can also be easy target of attackers as they will affect functionality of that device.

(ii)Use strong encryption and strong authentication for wireless network.

Strong encryption can make it hard for attackers to intercept and listen network traffic, while strong authentication will make it difficult for attackers to access network

(iii)Allow only specific computers to access network resource. Use role based access to network resources.

Role based access to network resource will increase security of network, specific people will only be able to see and access specific network resources.

(iv) Periodic Audit Wireless network, area , coverage, traffic analysis, can help reducing the risk of man in middle and denial of service attacks.

Periodic audit of wirless network and analysis of log files will not only secure wirless communication but also will helo detect any attempts of access to wireless resources.

(v) Use signal hiding techniques to avoid getting located by attackers.


Feb 2nd, 2015

Did you know? You can earn $20 for every friend you invite to Studypool!
Click here to
Refer a Friend
...
Feb 2nd, 2015
...
Feb 2nd, 2015
Aug 21st, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer