Question

In: Computer Science

You are about to implement the wireless network security measures and policies you just described above,...

You are about to implement the wireless network security measures and policies you just described above, and your boss sends you to talk with two operations managers. The managers are concerned that new restrictions will inhibit their workers and lower performance, which would create a risk to the company in meeting its minimum production levels. Your task (to answer this question) is to explain to the managers how the wireless security measures and policies relate to risk management for the company and alleviate the managers’ concerns.

Solutions

Expert Solution

Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats.

Wireless networking presents many advantages Productivity improves because of increased accessibility to information resources. Network configuration and reconfiguration is easier, faster, and less expensive. However, wireless technology also creates new threats and alters the existing information security risk profile. For example, because communications takes place "through the air" using radio frequencies, the risk of interception is greater than with wired networks. If the message is not encrypted, or encrypted with a weak algorithm, the attacker can read it, thereby compromising confidentiality. Although wireless networking alters the risks associated with various threats to security, the overall security objectives remain the same as with wired networks: preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems. The objective of this paper is to assist managers in making such decisions by providing them with a basic understanding of the nature of the various threats associated with wireless networking and available countermeasures.

The popularity of wireless Networks is a testament primarily to their convenience, cost efficiency, and ease of integration with other networks and network components. The majority of computers sold to consumers today come pre-equipped with all necessary wireless Networks technology. The benefits of wireless Networks include: Convenience, Mobility, Productivity, Deployment, Expandability and Cost.

Wireless Network technology, while replete with the conveniences and advantages described above has its share of downfalls. For a given networking situation, wireless Networks may not be desirable for a number of reasons. Most of these have to do with the inherent limitations of the technology. The disadvantages of using a wireless network are:Security, Range, Reliability, and Speed.

Wireless Networks present a host of issues for network managers. Unauthorized accesspoints, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN troubleshooting. Most network analysis vendors, such as Network Instruments, Network General, and Fluke, offer WLAN troubleshooting tools or functionalities as part of their product line.

Unauthorized access to company wireless and wired networks can come from a number of different methods and intents. One of these methods is referred to as “accidental association”. When a user turns on a computer and it latches on to a wireless access point from a neighboring company’s overlapping network, the user may not even know that this has occurred. However, it is a security breach in that proprietary company information is exposed and now there could exist a link from one company to the other. This is especially true if the laptop is also hooked to a wired network.

Note: Plzzz don' t give dislike.....Plzzz comment if u have any problem i will try to resolve it.......


Related Solutions

As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
1. Describe the basic components of network security and the differences between wired and wireless network...
1. Describe the basic components of network security and the differences between wired and wireless network security best practices.
A wireless network has a loosely defined boundary as described in the lecture slides. Describe the...
A wireless network has a loosely defined boundary as described in the lecture slides. Describe the security issues of such a network boundary. For at least one of the security issues, describe why CIA will not be able to solve the issue, and briefly describe a method which may be used as a solution.
Implement the Metropolis-Hastings algorithm below¶ Make sure to read this: Implement the algorithm described above (in...
Implement the Metropolis-Hastings algorithm below¶ Make sure to read this: Implement the algorithm described above (in the "How it works" section), where you take some user-defined number of steps that randomly step in W and I and are scaled by a step_size. This means you don't want to take steps of a discrete size, but instead use a random distribution of step sizes that are scaled by your step_size variable. You'll want to take steps that have an equal chance...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
Assume you have a wireless network of 90m coverage and this network is connectionless oriented. There...
Assume you have a wireless network of 90m coverage and this network is connectionless oriented. There are two networks topology (WIFI or WIMAX). Critically analyse the given networks and answer the following: 1- Compare between WIFI and WIMAX 2- Which are of them is better to be used in this case
Do you have a wireless network at home? What kind of wireless equipment do you have?...
Do you have a wireless network at home? What kind of wireless equipment do you have? Is your wireless network encrypted? If so, what level of encryption and other security options are you utilizing? If not, how can you take care of protecting your network?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT