evaluating threats and vulnerability

User Generated

fzneg_pbqr

Writing

Description

You are the chief information technology officer at a small outpatient health care facility in Riyadh . The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians. There are 25 clinical rooms. Each room is equipped with a computer. In addition, five computers are used by the administrative assistants for patients’ appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

Your report should include the following materials:

  • Existing and potential vulnerabilities and threats
  • Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats
  • Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility
  • Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Your well-written paper should meet the following requirements:

  • Be six to eight pages in length
  • Contain illustrative diagrams for the considered systems
  • Include at least five credible external references in addition to the textbook
  • Formatted according APA writing guidelines.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: WIRELESS NETWORK SECURITY THREATS AND VULNERABILITIES 1

Wireless Network Security Threats and Vulnerabilities
Student’s Name
Institution of Affiliation
Course
Date

WIRELESS NETWORK SECURITY THREATS AND VULNERABILITIES

2

Introduction
The fact that the outpatient's health care facility in Riyadh has connected all its computers
to a common LAN using wireless architecture means that there are security threats and
vulnerabilities expected. In addition, the portable devices used by physicians are vulnerable to
security threats because they are connected wirelessly to the rest of the network. This report
provides the security status of the facility's network and provides recommendations to mitigate
the identified security threats and vulnerabilities.
Existing and Potential Vulnerabilities and Threats
Since the healthcare organization is currently using a wireless network in its LAN, there
are many network vulnerability and security threats that it has to contend with in its operations.
First, there is a possibility of its network being intercepted. The data that is transmitted through
the Wi-Fi may be captured by eavesdroppers using directional antennas (Bidgoli, 2016).Denial
of service is another vulnerability that the organization must deal with since the data transmitted
through the Wi-Fi is subjected to unlicensed frequencies (Boyle & Panko, 2014). Sometimes the
organizations may affect the vulnerabilities and security threats attribute to the rogue APs who
many penetrate the organization's network without the knowledge of the management. The WiFi may lack accurate classification which makes it more difficult to track and automatically
block the rogue APs.
The Wi-Fi may also attract intruders who operate in the neighborhood, thus posing
security threats and vulnerability to the organization’s network. It may not be easy to monitor all
the activities and operations of the intruders given the high competition it may attract. The use of
Wi-Fi outside the healthcare organization may be unmanaged, thus increasing traffic congestion
in the network and leading to a slowdown in the Wi-Fi speed (Chen & Zhang, (n.d.). The Wi-Fi

WIRELESS NETWORK SECURITY THREATS AND VULNERABILITIES

3

may also pose risks to several APs that are misconfigured in one way or another, thus causing
configuration errors that increase the security risk of the network. Since the APs of the Wi-Fi are
managed by individual employees, there is a high likelihood that the organization will segment
and prioritize multiple media into the network further causing security threats and vulnerability
to the network.
The organization’s Wi-Fi may also face security threats and vulnerabilities attributed to
the soft APs and Ad Hocs...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags