Running head: IT530 ASSIGNMENT UNIT 6
IT530 Assignment-Unit 6
No Name
Kaplan University
Prof: Jeffrey Robinson
03/15/2014
IT530 Assignment-Unit 6
Introduction
Wireless Security
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
…show more content…
Network security revolves around confidentiality, authentication, message integrity, and access availability.
The vulnerabilities of wireless networking may involve the attack of web browsers, on-line banking, DNS servers, and routers exchanging routing table updates, purchases, transactions or stolen personal data. The lack of security with a wireless system may result in denial of service, hijacking, fake impersonation, or eavesdropping for interception of messages through cyber-crimes. Each communicating user should select the language of cryptography, agree and share the symmetric key. The best security practices includes firewalls, intrusion detection systems, secured and updated applications, transport, configured properly working network, and link layers.
Questions/Answers
Assignment Instructions:
1. Consider your own use of wireless networks; do you use a smartphone or a tablet?
Answer: I use an IPAD Air, a smartphone, wired/wireless desktop, and a Laptop.
2. Do your methods of securing your handheld devices differ from any methods that you may use when connecting wirelessly with a computer?
Answer: The method for securing my smartphone and my IPAD Air is much different from my Desktop and Laptop. Do you use a wireless network at your workplace?
Answer: No, my company does not allow wireless systems, not even with the telephone.
If so, what methods are used in your workplace for securing the wireless “cloud”? Would you suggest
The network level security will form the relationships of authentication, encryption and authorization for the wireless network and its connectivity between wireless clients to the internal network. Some recommendations are:
To improve security, the Wi-Fi uses various built-in WEP encryption technologies to prevent attacks from
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
Users that have a wireless LAN should add security to ensure only intended users have access. Some safeguards include use of WEP (Wired Equivalent Privacy) encryption, IPsec, WPA (WiFi Protected Access), with a firewall or DMZ. A DMZ (demilitarized zone) is a physical or logical sub-network that separates the LAN from other entrusted networks
Guidelines: It’s always best to introduce a paper to the reader. It sets the tone and provides an overview of what will be covered and what the goals are.
Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication.
To solve these problems a company can implement Wi-Fi on their network. This can reduce the price of implementing additional cable in the network.
Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.
Primarily we use USB and LAN connections to assist the Marines in their gathering of data. In various austere environments we rely heavily on the use of a secure wireless router (extensive security setup) and mobile tablets to allow for collection of data while on the move (not connected). Typically the Instructors will utilize the tablets for a 24 hour period outside of coverage returning to their headquarters (HQ) after that time period.
Wireless connectivity is critical to most homes and corporations as the world advances in technology. The technology has grown to a capacity that allows for extreme growth in wireless infrastructure as well as a trend of bringing your own technology device. Many corporations experience a high volume of critically important information being transferred over it wireless network so security is essential. There are many differences between a home and corporate wireless installation and each has its differences in securing.
In an effort to improve security, the Public Safety Wireless Networks (PSWN) program in coordination with the Department of Justice took action to create the Public Safety Communications Security Awareness Guide and focus on solutions to security issues. Therefore, this paper will provide a summary of wireless communications issues and address issues as various agencies cooperate, coordinate, and use interoperable digital technologies to meet public safety requirements. I aim first to discuss communications system security, identify vulnerabilities and address how critical physical, network, communications, and administrative security components operate to protect against intrusions. The final section will include PSWN program, federal, state, and local agencies proposed solutions to improve security
Moreover, it is important to note that while cryptography is necessary for secure communications, this report is not by itself sufficient. The reader is advice then, that the topics covered in this paper only describe the first of the many steps necessary for better security in a number of situations.
“Wireless security isn’t just a big issue for control systems, but for all uses, mainly because wireless is becoming so pervasive,” says Staggs. “It’s very easy to plug wireless in almost anywhere. However, you have to be able to find the signals and know if someone has put in a rogue point.
Attention Getter: Other than our car keys, our mobile devices have become something that we can’t leave the house with. This includes our smartphones, laptops, tablets, USBs, and digital cameras.
The following tips according to the U.S. Department of Homeland Security can help users enhance the security for mobile devices and potentially prevent them. The first one is to consider the security features when purchasing a mobile device, make sure that the service provider offers encryption when sending data through the network, ask if the provider can find and wipe remotely a mobile device and delete malicious apps. In addition, check if the provider offers authentication features like passwords.