Question

In: Computer Science

Wireless Security Systems Earlier in the course, you reported on wireless behaviors and antennas and conducted...

Wireless Security Systems

Earlier in the course, you reported on wireless behaviors and antennas and conducted your own site survey for UTU. In this unit, you will research and report to UTU on wireless security systems and potential risk factors specific to college campuses.

What do I have to do?

Please address the following items:

  • Using the Internet, research wireless intrusion prevention systems and vendors that supply such systems. Choose 2–3 vendors to recommend to UTU and write a brief report explaining why this type of system is necessary.
  • Certain campus buildings, such as the registrar’s office, the financial aid office, and any other department that houses student records, are at higher risk if security is breached. In your report, explain to UTU how your wireless intrusion prevention system would protect these sensitive areas.

Write a one to two page double-spaced report as if you were presenting to the client. Include an introduction and a conclusion, and make sure that what you are presenting is clear, detailed, accurate, and free of errors. Be sure to fully answer all questions and prompts, and provide justification for your answers when necessary.

Solutions

Expert Solution

Hi,

WIRELESS INTRUSION PREVENTION SYSTEM

Introduction:

Today everyone is very much dependent on internet . There are many advantages of using this internet . For the development of any areas this internet is an important part . But using this internet there is some disadvantages too . There is a big chance of attackers to hack the personal details if internet is not properly used . That is authentication is an important part . Internet can be used to secure storage of data . Proper secuity criteria have to be used , otherwise there is chance of hackers to hack all the data and all the datas may be lossed . In such cases wireless intrusion prevention systems are used . This systems are very much used to provide better security in any organization . They detect what are the problems with the systems and they not only detect the problems but also do measure to prevent the problems too.

Today in every organization there is competition takes place and every one is compete with each other and they try to hack the proper funcitoning of the other organization by hacking through the internet . And this are done by unauthorized access , and by unauthhorize access the hackers will collect all the secret informations and datas . This affect the organization very much and their proper functioing may block . If every organization uses this intrusion systems , this types of attacks will never occur as they protect the organization and prevent form external attacks.

An intusion prevention systems main function is that it contionously monitor the system activities and if it detect anything unwanted activities, it prevent that activities. The main advantage is that it can detect if there is any attack is going to happen and it can prevent from that attacks . It provides a signature . That is the   organizations have a signature and it uses the signature to detect the attack . If there is any mismatch in the signature occurs then it is sure that an attack occurs.

The three main advantages of wireless intrusion prevention system is that :

  • Availability : It is one of the main advantage that is it available any time if an unauthorised access is occurs.
  • Integrity : It prevents any altration occurs to the actual data.
  • Confidetiality : It prevent the copying or veiwing of data from any unauthorized users .

The vendors are the providers of the intrusion prevention system . some of the vendors are given below:

  • Cisco Wireless Intrusion Prevention system : It is one of the most important vendors of intrusion system . It provide most accurate and cost effective security . It monitors performance across the system. If any wireless htreats are detected it notifies the threats to the administrators and helps to detect the attacker . The main advantage of cisco is that it can detect the attacker and can detect the correct location of the hacker.
  • Hill stone s series wireless intrusion prevention system : It is anothe r vendor of the intrusion prevention system. It is a rule based methodology . It block the threats using signature analysis. It provide high detection rate and the cost is very low .
  • NGIPS Next Generation Intrusion Prevention system : It is another vendor of intrusion detection their main advantage is that it cna detect the data leakage and any illegal security breach is occuring .

An intrusion prevention system can detect any malicious attack so it can be act as an antivirus. In an institutional environment there is datas regarding the student details and these data should be protected from any unauthorized access so   inorder to prevent this attack if an intrusion detection system is there in that system they can identify the attackers and can locate where the attacker is . So it avoid the risk .

Conclusion :

This intrusion detection system are very important now a days because they are very effective to determine the attacks . They are very cost effective and easy of use . Comparing with any other technologies for protection against attack this intrusion prevention is the best one . It can be used in any organization or any networks without considering the size . It is very useful one .

Thank you...


Related Solutions

Your broker called earlier today and offered you the opportunity to invest in a security. As...
Your broker called earlier today and offered you the opportunity to invest in a security. As a friend, he suggested that you compare the current, or present value, cost of the security and the discounted value of its expected future cash flows before deciding whether or not to invest. The decision rule that should be used to decide whether or not to invest should be:
This is an Introduction to Homeland Security course question. In a Homeland Security context, do you...
This is an Introduction to Homeland Security course question. In a Homeland Security context, do you believe that the term “prevention,” differs in meaning from the terms “mitigation” or “preparedness?” What types of prevention activities can be conducted in advance of a terrorist attack?
The Cash account of Guard Dog Security Systems reported a balance of $2,540 at December 31​,...
The Cash account of Guard Dog Security Systems reported a balance of $2,540 at December 31​, 2024. There were outstanding checks totaling $400 and a December 31 deposit in transit o f$100. The bank​ statement, which came from Park Cities​ Bank, listed the December 31 balance of $3,340. Included in the bank balance was a collection of $510 on account from Brendan Ballou​, a Guard Dog customer who pays the bank directly. The bank statement also shows a $30 service...
Considering what you have learned throughout this course, what skills, behaviors or approaches might you apply...
Considering what you have learned throughout this course, what skills, behaviors or approaches might you apply in your organizational setting either to improve patient care, or to advance your professional career? What can you do today to set your plans in motion?
Mike has chosen improvement of commercial systems and security threat as a research subject for his Informatics Ethics course.
Case Study 1Mike has chosen improvement of commercial systems and security threat as a research subject for his Informatics Ethics course. He develops an algorithm for the purpose of implementing his project in a practical process. He can fix the security vulnerabilities of some companies with this algorithm and he adds these vulnerabilities to his project as project grade. When one of the companies that Mike has entered searches the source of the attack, they find university laboratory as a...
compare and contrast the various costing systems you learned about in this course as part of...
compare and contrast the various costing systems you learned about in this course as part of your defense. ACC 202 SNHU needed for a power point slide
Discuss how you can apply the concepts learned in this Management Information Systems course to your...
Discuss how you can apply the concepts learned in this Management Information Systems course to your current or future career. How might the lessons you have learned positively impact your career success?   I am in Finance
The following 3 instances of code was provided by my embedded systems course. Can you explain...
The following 3 instances of code was provided by my embedded systems course. Can you explain what is happening in each code segment? === code 1 === void foo() { uint8_t a=2; uint8_t b[]={b0, b1, b2}; // They are the last three digits of your A# uint8_t* c=b; uint8_t* d=&a; } === code 2 === __extension__ typedef struct tagT1CONBITS { union { struct { unsigned :1; unsigned TCS:1; unsigned TSYNC:1; unsigned :1; unsigned TCKPS:2; unsigned TGATE:1; unsigned :6; unsigned TSIDL:1;...
a) How do the pay-as-you-go and fully funded social security systems affect the equilibrium in the...
a) How do the pay-as-you-go and fully funded social security systems affect the equilibrium in the model with interrupted generations? b) In the Fisher two-period model, if the consumer is a saver, consumption in periods one and two are normal goods, and the income effect of an increase in interest rate is greater than the substitution effect, then saving: A) will increase. will decrease. will not change. may either increase or decrease.
Operating systems are in use everywhere in our society: Discuss what security measures you have implemented...
Operating systems are in use everywhere in our society: Discuss what security measures you have implemented or will implement as a result of this unit
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT