ISSC 262 APUS Basic Parts of Remote Network Security Discussion Reply
Hello Class,
Considering that there are many security concerns surrounding wireless networks, and many tools are freely available, how does and administrator or even an individual user go about ensuring the security of their wireless network? List a minimum of two methods/techniques, and explain the rationale for your decision?
The age of mobile devices is upon us and with every new technology leap in the wireless field there is an equal and more important leap in security that must happen. Wireless signals have strengths and weaknesses. The security of that signal as it travels from one point to the next is one of the greatest weaknesses that there is in wireless communications. Secondly, wireless networks rely on the range of access points to connect with devices, and it is this range that allows individuals to potentially gain access to those connections.
Signal Security:
The signal of a wireless connections has a few obstacles that it needs to overcome to be reliable and available. It must overcome walls, other devices and distance to be successful. Because of these obstacles the signal can travel further then the area in which it is intended to cover. The need to protect the data that is being sent and received is paramount in the integrity of the system. In the instance of Wi-Fi, the protocol is based off of IEEE 802.11 and within that standard there are ever changing requirements to securing wireless signals.
Using the above standard it would be important to ensure that a administrator understands the needs of the organization and its burden on the network system. Ensuring that the Wi-Fi system is operating on current firmware and is running the most update IEEE 802.11ax protocols will reduce the risk of exploitation. Every piece of equipment and software in the Wi-Fi system is a target for vulnerability exploitations. Frequent examination of patches and vulnerability updates should be conducted on each component.
Access Points:
In larger organizations there is a need to have multiple access points throughout its physical spaces. It is these access points that allow devices to connect to the network. Each point is a place that malicious intent can be conducted. Hardening of these system is a necessity of security administrators.
Hardening Access Points:
There are several ways that an access point can become secure. Just as noted above ensuring that administrators understand the equipment and its known vulnerabilities will reduce risk to hacking. The encryption the access point uses highly affects the integrity of the signal. For an access point to work it needs to broadcast it location or SSID and it might be worth hiding that SSID. Never use default passwords or settings that can increase the vulnerability of the network. Periodically checking the areas for malicious access points spoofing as if they are the real access point. Provide separate networks for different departments or those that are visiting. Limiting the number of devices or types of devices can help to reduce the potential of attacks.
Like many different technologies there is a need to update and replacements on a regular basis or if the equipment or software becomes a risk to the organization. It is up to the organizations management and those in charge of the welfare of the IT network to ensure its is being utilized and safeguarded to its full potential.
Mynyk
Oriyano, S.-P., & Solomon, M. G. (2018). Wireless Vulnerabilities. In Hacker Techniques, Tools, and Incident Handling. Jones & Bartlett Learning, LLC.
Rubens, P. (2018, October 10). How to secure your Wi-Fi at home and in your business. TechRadar; TechRadar pro. https://www.techradar.com/news/networking/wi-fi/five-tips-for-a-secure-wireless-network-1161225
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
