Question

In: Computer Science

Employees want to be mobile, having the ability to move from their desks to meetings and...

Employees want to be mobile, having the ability to move from their desks to meetings and back again. How do you ensure that the data they are accessing follows the rules for CIA? In a 500- to 750-word essay, develop a plan for securing an enterprise level wireless network, such as the private WGCUSECURE WiFi Network used here on campus. Make sure to address the following: Which wireless security options would you deploy, preventing typical wireless attack vectors? Should you use a layered security approach? Why? Describe the strategy for your design. Include a network diagram. Use Microsoft Visio or online network diagraming tools, as identified in the required readings to visualize your design.

Solutions

Expert Solution

having access to the data or internet wirelessly is usually refered as WIFI.
wifi allows us to acess the internet from any place without physically being connected via wire.
with all this benefits there comes some problem with the security.

now as it is referred that the connection should be CIA level secure than there are few methods which can be implemented so that the network get secured and the intruders wont bypass the security and acess the data.

hidding the ssid:- the first thing that can be done is to hide the ssid of the network so that only those who know the name of network can try connecting to the network else they will be deprived of the acess to the office network.

Strong wifi password:- using a WPA2 or WPA3 along with AES makes it impossible for the intruder to crack the password using brute-force attack or dictionary attack
Another feature that can be added is timeout system after certain number of failures.
like lets take a scenerio that some tried a brute force attack then making a policy so that after certain number of failure that macaddress will be blacklisted can actually add another level of security.

most common hardware level security method is MAC Filter. Now lets imagine a scene that there are multiple devices that wants to connect to the network only one has to be given the acess.
so what we do is add a mac filter on the network so that despite of having the network password the intruder wont be able to acess the network. another benefit of having the mac filter is only approved devices will be able to gain acess in the network

another method is assigning static ip address to the wireless devices connected to the network.
so that any other computer then the office employees wont be able to connect to the network at any cost.
and using only fixed number of ip address= number of devices will add another layer of the security.
usually what happens that the router gives us a range of the ip address so despite of using the complete range we will be using only the ip address equivalent to the number of devices.

another method is by disabling the WPS and UPnP.
now talking about the what WPS is.
Wps stands for wireless protected system. if your router has a wps button then you can easily gain acess to the router just by pressing the wps button on the router and the wireless device at once.
what happens here is inspite of connecting using the pasword the router give permission to acess using a pin which will act as password for the device.
disabling this will prevent the intruder to gain acess if he/she has physical acess to the router at any extend of time.
now there comes UPnP that stand for the universal plug and play. disabling this adds a layer of security in the network.

dispite of having all these security measures in the network. if the intruder have physical acess to the router then the game will be over. so we will be using acess points instead of routers so that even if he gets hands on the acess point he wont be able to gain the acess. or change any thing in the network.


Related Solutions

Would having personal development meetings that focuses on an employer’s personal goals be beneficial to the...
Would having personal development meetings that focuses on an employer’s personal goals be beneficial to the performance management process? one paragraph min response pls
Mobile systems are having a major impact on business and society today. Accordingly, mobile applications now...
Mobile systems are having a major impact on business and society today. Accordingly, mobile applications now form an important component of marketing and business processes for many companies. Assume that the owner of a bike rental shop at a popular summer resort wants to create a mobile application to aid customers who want to book bikes via their mobile systems. You have been hired as a consultant to recommend the best strategy for creating such an application. In an essay,...
Finally, the researchers are interested in whether workplace cohesion attitudes change, as employees move from sub-optimal...
Finally, the researchers are interested in whether workplace cohesion attitudes change, as employees move from sub-optimal working conditions to above average working conditions. They collect data from the same employees, first when working under sub-optimal conditions and then one month after moving to above average conditions. Test for this hypothesis based on the new data below.                                                 Sub-standard   Above average       Difference (sub-above) x    80.00 76.00 4.00                      s 6.00 8.00 3.00                      n   40.00 36.00 36.00 Type of...
The amount of time each week that Dunder Mifflin employees spend in pointless meetings follows a...
The amount of time each week that Dunder Mifflin employees spend in pointless meetings follows a normal distribution with a mean of 90 minutes and standard deviation of 10 minutes. A. What is the probability that employees spend between 81.5 and 103.5 minutes in meetings in a week? B. The probability that employees spend between 80 and ???? minutes in meetings in a week is equal to 0.8351.
what are the seven factors that affect a patients ability to move and maintain body alignment?
what are the seven factors that affect a patients ability to move and maintain body alignment?
Meetings cost money, why? There are six [6] employees in a healthcare morning meeting. Five [5]...
Meetings cost money, why? There are six [6] employees in a healthcare morning meeting. Five [5] of the employees earn $45 per hour; and, one[1] employee earns $50 per hour. Calculate the direct cost of a one [1] hour meeting to the organization. Do not consider travel time or fringe benefits.
With most customers having a smartphone, mobile apps are becoming an essential tool for
With most customers having a smartphone, mobile apps are becoming an essential tool for hotels and other businesses in hospitality and tourism. If you were an app developer pitching to a hotel, how would you convince them to have one of their own?
1.(a)How might the fact that plants do not move influence their ability to adapt to climate...
1.(a)How might the fact that plants do not move influence their ability to adapt to climate change and other environmental changes? (b)What are the main functions of a seed? Why is it not surprising that seeds are an excellent source of nutrients? (c)Some pollen grains are dry and some are sticky. Which would you expect to be carried on wind and which on the body of a pollinator? Many people have pollen allergies. Suggest whether dry or sticky pollen would...
i) How does the ability of phyla Annelida to move compare with the phyla Platyhelminthes, which...
i) How does the ability of phyla Annelida to move compare with the phyla Platyhelminthes, which prominently use adhesive/releaser glands to facilitate movement? Describe their movement using two examples from specific groups of annelids (structures & how it's used) in one or two paragraphs. ii) Describe the circulatory & nervous systems of phyla Annelida and how they relate to their metamerism. Finally, iii) compare your answer from part iii with the myriapods found in the phyla Arthropoda.  
Creating Customers on the Move The advent of mobile commerce (m-commerce) has begun to create significant...
Creating Customers on the Move The advent of mobile commerce (m-commerce) has begun to create significant changes in the way consumers make purchasing decisions. The introduction of online shopping first began to draw customers away from brick-and-mortar retailers, changing the location of where they made their purchases. The use of mobile devices has expanded the location of purchase decisions even further, so now consumers can make purchases from almost anywhere, so long as they have a mobile device with them....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT