Question

In: Computer Science

Explain how you would secure your company’s internal wireless network to prevent unauthorized access, including how...

Explain how you would secure your company’s internal wireless network to prevent unauthorized access, including how it’s configured and what policies might need to be created and enforced to ensure employee compliance.

Solutions

Expert Solution

Let us understand how a wireless network works initially.

1)The wireless network sends its signals through the air upto some range in a company's internal wireless network.

2)The device which is in that particular range can pull that signal and access the internet.

3) If we don't take necessary precautions, any device within that range can access our network.

Now, let us understand how to prevent unauhorized access and how it's configured

  • we should use encryption on a wireless network i.e., we should encryption which is being sent over the network. Encryption makes the information you sent into code which can not be accessible by others.Your computer, router, and other equipment have to use the same encryption.Eg:-WPA2 encryption.
  • We should limit the access to the network.All the deIvices which are able to communicate with a network are assigned a unique MAC address so that routers can allow only devices with particular MAC addresses to access to the network.
  • It is also important to secure a router as it is the communication between a local network and internet.The router can be kept secure by changing the preset password of router,updating your router time to time,logging out as admin to avoid piggyback of sessions and also disable remote access to desktop features
  • Apart from all the above steps, we should follow the basic steps of protecting our computer like having an antivirus, firewall and antispyware etc.
  • Also use strong passwords to access the network.

The policies might need to be created and enforced to ensure employee compliance are as follows:-

  • It is important to have the security procedures written down in order to understand and you make them easily accessible for every employee.
  • Make some mandatory courses for every employee to make them understand each and every security policy and conduct time to time assignments or quiz on the same.
  • Make employees understand why security procedures are necessary.Give them some reasons and examples on the same.Tell them following those procedures are a part of company success.
  • Whenever an employee wants to view the security policies and procedures, make sure that they are easily accessible through a link or a web application in your network and  use digital documents to make sure all policies and procedures are easily accessible for every employee.
  • Provide Timely remainders to employees to view the latest updated security policies through mails or personal communication. If possible reward all the employees who strictly follows security procedures because of which others may get inspired.

Related Solutions

QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
With regard to Internal and External Network Infrastructure what would you change or what recommendations would...
With regard to Internal and External Network Infrastructure what would you change or what recommendations would you provide? How could Internal and External Network Infrastructure aspects perhaps enhance a project?
In 300 words or more how would you handle and/or prevent mistreatment in your public health...
In 300 words or more how would you handle and/or prevent mistreatment in your public health facility as an administrator?
If you have a network with 300 computers explain how you would setup an IP address...
If you have a network with 300 computers explain how you would setup an IP address scheme to meet the needs of the network (draw this if necessary) If you get a computer that has the wrong IP address and is assigned via DHCP how can you get a new address? Answer for command line and gui. What does it mean when you get a 169.x.x.x address?
You have been using your phone and your school's Wi-Fi network to access hosts on the...
You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.
Your internal desktop network is in the 172.16.0.0/16 range. You will need to know this in...
Your internal desktop network is in the 172.16.0.0/16 range. You will need to know this in order to answer the questions. Keep the Cisco wildcard method of network notation in mind as you answer. Q1-Create a Cisco Access Control List entries to allow the outside world to get access to your Web server. Your Web server has the IP address of 6.45.31.42
How would you secure computer networks if you could design the Internet? What technologies would you...
How would you secure computer networks if you could design the Internet? What technologies would you deploy or develop to meet the need? CMGT/442
In your manufacturing company, how would you access and separate the product cost and period cost?...
In your manufacturing company, how would you access and separate the product cost and period cost? Show your explanation briefly with a suitable numerical example.
Identify and explain how internal controls for e-commerce would be implemented and how it would then...
Identify and explain how internal controls for e-commerce would be implemented and how it would then protect the company's assets. PLEASE NO HANDWRITTEN ANSWERS! I CANNOT TRANSLATE HALF OF THEM!
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT