preview

Essay about IT530 Assignment-Unit 6

Better Essays

Running head: IT530 ASSIGNMENT UNIT 6

IT530 Assignment-Unit 6
No Name
Kaplan University
Prof: Jeffrey Robinson
03/15/2014

IT530 Assignment-Unit 6
Introduction
Wireless Security
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security …show more content…

Network security revolves around confidentiality, authentication, message integrity, and access availability.

The vulnerabilities of wireless networking may involve the attack of web browsers, on-line banking, DNS servers, and routers exchanging routing table updates, purchases, transactions or stolen personal data. The lack of security with a wireless system may result in denial of service, hijacking, fake impersonation, or eavesdropping for interception of messages through cyber-crimes. Each communicating user should select the language of cryptography, agree and share the symmetric key. The best security practices includes firewalls, intrusion detection systems, secured and updated applications, transport, configured properly working network, and link layers.
Questions/Answers
Assignment Instructions:
1. Consider your own use of wireless networks; do you use a smartphone or a tablet?
Answer: I use an IPAD Air, a smartphone, wired/wireless desktop, and a Laptop.
2. Do your methods of securing your handheld devices differ from any methods that you may use when connecting wirelessly with a computer?
Answer: The method for securing my smartphone and my IPAD Air is much different from my Desktop and Laptop. Do you use a wireless network at your workplace?
Answer: No, my company does not allow wireless systems, not even with the telephone.
If so, what methods are used in your workplace for securing the wireless “cloud”? Would you suggest

Get Access