In: Computer Science
Create a Wireless Security Policy document. Refer to the Wireless Communication Policy example located within the required readings as a template. Make sure to address the following:
Then, in 250 words, summarize your findings and provide a recommendation to your company CIO.
Since wireless networks transmit data over a medium that is shared via everyone, each person with a will matched receiver or transceiver is able to listen in on the radio alerts being sent.
Ensuring that the eavesdropper isn't always capable of convert these indicators into the unique message is a suitable security assets of any wireless networks, called making sure confidentiality.( This was one of the three security necessities we cited earlier, in conjunction with integrity and availability).
Finally, an attacker may want to transmit masses of random facts on the frequency being used by the wireless community, congesting the network and thus stopping other customers from sending facts. As we saw earlier inside the course, this is referred to as a 'denial-of-serivce'(DoS) assault and is an instance of an attack on the availability of the network.
Encryption can be help ensure:
-:confidentiality
- integrity
- authentication