Question

In: Computer Science

I need some keypoint to start and complete this powerpoint, thank you. "Lake Point Consulting Services...

I need some keypoint to start and complete this powerpoint, thank you.

"Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in
their final year of the security degree program at the local college.

Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.
1. Create a PowerPoint presentation for the staff about the threats against WLANs and the weaknesses of the IEEE 802.11 security protocols. Also, include information about the more secure WPA2. Your presentation should contain at least 10 slides"

Solutions

Expert Solution

Threats against WLANs


There are a number of main threats that exist to wireless LANS, these include:
1.   Rogue Access Points/Ad-Hoc Networks
this type of attack requires some amount of physical access; this is required because if a user associates with a rogue access point then is unable to perform any of their normal duties the vulnerability will be short lived and not that effective.
2.   Denial of Service
Anybody familiar with network security is aware of the concept of denial of service (DoS). It is one of the simplest network attacks to perpetrate because it only requires limiting access to services. This can be done by simply sending a large amount of traffic at a specific target.
A denial of service attack can also be used in conjunction with a rogue access point. For example, a rogue access point could be setup in a channel not used by the legitimate access point and then a denial of service attack could be launched at the channel currently being used causing endpoint devices to try to re-associate onto a different channel which is used by the rogue access point.
3.   Configuration Problems
Simple configuration problems are often the cause of many vulnerabilities, this is because many consumer/SOHO grade access points ship with no security configuration. A novice user can set up one of these devices quickly and gain access. However they also open up their network to external use without further configuration.
4.   Passive Capturing
Passive capturing is performed by simply getting within range of a target wireless LAN and then listening and capturing data. This information can be used for a number of things including attempting to break existing security settings and analyzing non-secured traffic. It is almost impossible to really prevent this type of attack because of the nature of a wireless network; what can be done is to implement high security standards using complex parameters.

Weaknesses of the IEEE 802.11


⦁   It has traffic disruptions.
⦁   Network security and the maintenance needed to stay secured.
⦁   It is required periodic maintenance.
⦁   Data transmitted over radio waves can be captured by any Wi-Fi ready devices in the area.
⦁   Unauthorized use.
⦁   It has unauthorized uses.
⦁   Frame spoofing.
⦁   Session hijacking.

Wi-Fi Protected Access 2:-


Wi-Fi Protected Access 2(WPA2) is a network security technology commonly used on Wi-Fi wireless networks. It's an upgrade from the original WPA technology, which was designed as a replacement for the older and much less secure WEP.
WPA2 is used on all certified Wi-Fi hardware since 2006 and is based on the IEEE 802.11i technology standard for data encryption.
When WPA2 is enabled with its strongest encryption option, anyone else within range of the network might be able to see the traffic but it will be scrambled with the most up-to-date encryption standards.


Related Solutions

I need some assistance please 400 words and more thank you Lisa is walking down the...
I need some assistance please 400 words and more thank you Lisa is walking down the street in January when she notices a young man named Denny. Denny looks a little worse for wear, so Lisa offers to buy him lunch. As they are talking, Denny says to Lisa: “I’m in a pretty rough spot. I don’t have any money right now. But I promise to pay you $450 if you give me that coat you are carrying and some...
You are an I/O psychologist consulting with an individual who wants to start a small business...
You are an I/O psychologist consulting with an individual who wants to start a small business (two or more employees). Your client wants the business to be one in which the employees have a manageable level of stress, so you will need to consider the workload and environmental factors. Your client also wants to promote good communication among all employees, so you may need to consider the office layout, design, and other factors. Your client wants his/her employees to enjoy...
please i need SBAR for normal abdominal examination thank you
please i need SBAR for normal abdominal examination thank you
I need porters analysis on real estate project. Thank you
I need porters analysis on real estate project. Thank you
I need to update this program to follow the these requirements please and thank you :...
I need to update this program to follow the these requirements please and thank you : Do not use packages Every class but the main routine class must have a toString method . The toString method for Quadrilateral should display its fields: 4 Points. All instance variables should be declared explicitly private . Area incorrect : enter points no: 1 1 3 enter points no: 2 6 3 enter points no: 3 0 0 enter points no: 4 5 0...
I am about to start my graduation thesis, I need some interesting topics related to business...
I am about to start my graduation thesis, I need some interesting topics related to business Administration. Preferably something with Marketing, human resource management or international management. And how will be my method of research to accomplish?
I need the answer explained and computer typer so I can read it! thank you For...
I need the answer explained and computer typer so I can read it! thank you For a simple linear regression model yi= α + βxi + ui , i = 1 1- Suppose researchers want to know the effect of elementary school class size on students’ math scores(total score is 100), intuitively they think there exists a negative linear relationship between class size and students’ math scores. The researchers want to know the marginal effect of class size on student’s...
I think I have this figured out, but need a double check... Thank you Here is...
I think I have this figured out, but need a double check... Thank you Here is the question: Regional distributors are currently using continuous review inventory policy. Compute and describe their inventory management policy and associated cost. Ignore inbound and outbound transportation cost. Provide answers and calculations for order quantity, demand during lead time, safety stock, average inventory level, inventory holding cost per week, ordering cost per week, and total cost per week. The service level is 90% and the...
You need to complete n courses in order to complete your degree. Some of these courses...
You need to complete n courses in order to complete your degree. Some of these courses have prerequisites, for example: “course 1 has to be completed before course 3”. Your goal is to find an order to take all n courses and complete your degree. Observe the following input file. The first line in the file has 2 numbers n and p where n is number of courses and p is the number of prerequisites. Input: 5 3 1 2...
please create a 4-6 slide powerpoint on the doppler effect. Thank you
please create a 4-6 slide powerpoint on the doppler effect. Thank you
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT