Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Chapter 8 wireless network security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Chapter 8 wireless network security
Wireless Security Policy
Name
Strayer University
CIS 513
Date of submission
Wireless Security Policy
All of the Cisco Wireless Ap’s would be configured with a dedicated SSID which will help provide separate connection to the students and guests. As such, the faculty would have access to a secure login which would not be made available to the students, while the students have a different login interface. All of them would be registered in a secure database. Administrators would be able to add students to the existing database and register their machines and provide them with the required ID and password. In order to ensure that there is no rogue or unauthorized person connected to the network, CCA and the CSA or the Cisco Secure Agent would be implemented (Neil Anderson, 2008). They would regularly scan the client’s device to make sure that only authorized persons are connected. Apart from this, the wireless connection on the access points would be protected by WPA2
Wireless Network Security
Random checks are performed at regular intervals to check for user activity. When any of the users is found breaking security code, an immediate action is taken to notify user about violation.
Following are few activities on regular basis to ensure security:
•
…show more content…
Access points are disabled between 1am and 6 am. • Guest users are only given access between 8am to 6pm. All access points are directed so that their signals do not go beyond the outside building walls.
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
network. Wireless Network Staffing, Training, and Support Requirements Staffing requirements In order to deploy wireless network, following resources with mentioned responsibilities are required: • Implementation analyst - Review of documents and complete network diagrams. • Network engineer - Develop end-user and administrative documentations. • Field Engineer - Hardware ordering, track deliveries, dropping-off at worksite and hardware installation. • Technical engineer - Develop hardware documentation and track labor and equipment costs. Training and support requirements After the deployment of network, users are required to be trained on network security issues and appropriate use of wireless network services. The training plan will outline the requirements, schedule and methods to provide training to employees at all levels at XYZ institution about the wireless infrastructure. At the end of the training, employees will be adept with the changes being made and will also be fundamentally more aware about the wireless services at the institution. Terms and Definitions • DHCP means Dynamic Host Configuration Protocol • IP means Internet Protocol • MAC means Medium Access Control • SSID means Service Set Identification • VLAN means Virtual Local Area Network • WPA2 means Wi-Fi Protected Access II • CCA means Cisco Clean Access • CSA means Cisco Secure Agent • OC-3C means Optical Carrier 3 Concatenated • LAN means Local Area Network • Mbps means Megabit per second • 802.11a/b/g/n/ac is the specification for the wireless LAN. A, B, G, N and AC standards for revisions with AC being the latest. References Chipps, K. (n.d.). Certfication Zone. Retrieved from Chipps: http://www.chipps.com/How%20to%20Implement%20Wireless%20Networks.pdf CISCO. (2014). Cisco Aironet 3600 Series. Retrieved March 15, 2014, from CISCO: http://www.cisco.com/c/en/us/products/wireless/aironet-3600-series/index.html CISCO. (2014). Cisco Catalyst 6880-X Switch. Retrieved March 15, 2014, from CISCO: http://www.cisco.com/c/en/us/products/switches/catalyst-6880-x-switch/index.html CISCO. (2014). Cisco HyperSwitch ATM Family. Retrieved March 15, 2014, from CISCO: http://www.cisco.com/c/en/us/support/docs/switches/lightstream-atm-switches/10052-14.html CISCO. (n.d.). Industry Leading Performance with Cisco?s Aironet 3600 Series Access Point White Paper. Retrieved March 14, 2014, from CISCO: http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-3600-series/white_paper_c11-688713.html Neil Anderson, P. L. (2008). Cisco Networking Simplified .
4-way handshake can be leveraged here, for authentication in the aforementioned setup. In this mechanism, the access point starts by sending the EAPoL (Extensible Authentication Protocol (EAP) over LAN) message which contains the AP Nonce (Access Point Nonce), where Nonce is just a random sequence. The station leverages this information along with the MAC address and PSK, and creates a pairwise transient key. The generated STA Nonce (Station Nonce) is protected with the MIC (Message Integrity Code) created from the pairwise transient key. The message formed is then sent to the access point.
This was a community originally created by Scott Chasin and hosted by crimelab.com which changed the world of software industry. It is basically an electronic mailing list fully dedicated to issues about computer security. It had hot topics being discussed in the global forum that says about vulnerabilities, exploitation methods and vendor security-related announcements. [2]
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Properly secure wireless systems: - To prevent data breaches it is very important to secure wireless networks. WI- Fi network security is necessary because it is very easy to hack the data and unauthorized access. Breaches can be prevented by using strong passwords, encryption methods, and strong verification.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
...thorized permission to access any authorized computer in the library or computer centre to access necessary subject information. The technology is updated to latest to maintain any interruption of accessing data.
Yahoo monitors the actions of users, in part, by using "cookies." Cookies are small files that record visits to web pages. When you open up a cookie dispensing web page, the web server sends one or more of these files to your browser. The cookies will usually contain a number that is unique to that browser. Then the next time that this browser opens that particular page, the web site will both send a new cookie and retrieve the old one. This makes it possible, for sites to compile lists of how often visitors go to a particular page as well as when they visit it.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
Cisco certification is a accomplished scientific boost certificate skeleton which is feature with ongoing by Cisco company for advancing Cisco technology, cultivating the repercussion management design again designing troubleshooting personnel. Candidates burden help the prevailed Cisco certificates as valid combat of bread change or company qualification.
... Network administrators and intrusion analysts need to be aware of the risks associated with 802.11 network deployment, and the techniques that can be used to identify malicious client activity.
Remote access is a tricky concept to comprehend mostly due to the complexity of all of the different steps and process that all have to work together to ensure secure connections. The number one priority for any company is to make sure networks are secured. With a good portion of our workforce working remotely it can make that task even more difficult. To make sure that our employees devices whether company issued or personal are healthy enough to make those connections we use the NAP functionality of Windows Server 2012 to ensure compliance.
Wireless technology has come from the basics of cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with technology forever revitalizing. Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing wireless Internet at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly via a router.
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help to stop unauthorized users or intruders from accessing any part of a computer system. Detection helps one to determine whether or not someone attempted to break into a computer system, if they were successful, and what they may have done.
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
The hardware should be installed and configured first to enable the operating systems and software set up into the network systems. The operating system installed in the network systems should be considered as the main component of the network infrastructure. Therefore, the company should consider installing one type of operating systems, this because they have similar protocols thus the communication will be efficient. Similar operating system will enable network component to have seamless communication procedures between the components, therefore, if the company should adopt the latest windows 8, this is because the operating system have the latest standardization