Preview

Mitigation Techniques Analysis

Good Essays
Open Document
Open Document
732 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mitigation Techniques Analysis
Mitigation Techniques:

1. Establish a Wireless Security Policy.
Gartner study shows that security risks are more from internal users than from external users. Many a time people creates security risks to network simply because of ignorance. While securing a wireless network, we need to create a wireless security policy and train users before they start using wireless network.

The security policy should include “Acceptable uses”, Uses of “Antivirus”, use of “Host based Intrusion Prevention System”

2. Separate the Wireless LAN from Wired Network

Many of organizations are bridging the wireless network with the wired network. It doubles the security risk. Anyone connecting to the wireless network gets easy access to the wired network.

We need to create a separate wireless network from the wired network. Keep the wireless network in a separate
…show more content…
And restrict direct communication from Wireless VLANs to the Wired data VLANs.

3. Set up separate WLAN (SSID/VLAN) for Guest access

Many times organizations use the same wireless SSID for corporate wireless user’s access to the corporate resources and the Guest user’s access to the internet.

We need to create separate these two types of user’s wireless access. We propose to create two separate SSIDs. One SSID “Corporate” which will have access to the internal resources. Another SSID “Guest” which will be limited to internet access only and restricted from accessing the internal resources.

4. Secure the Wireless LAN, Use strong wireless encryption. Use of RADIUS and certificate services

WPA is easily breakable and we will always avoid using them. We will prefer to setup an internal RADIUS server and also configure internal certificate services. All version of windows servers can act as RADIUS server and also provide Certificate services. The feature in windows server is named and Network Policy

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Good Essays

    NT 1310 Unit 5 LAB 1

    • 417 Words
    • 2 Pages

    There are pros and cons to having a wireless and a wired buildings and it is fair to say that wireless becoming the norm is still some way off. A combination of wired and wireless is the way forward, at least for now. That way a business can…

    • 417 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hit-150-Wk4D1

    • 539 Words
    • 3 Pages

    (1) security features or software that protect information when a wireless network is used. (2) non-redisclosure policies. (3) storage and retention policies.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It241 Final

    • 446 Words
    • 2 Pages

    In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Infrastructure deployment scenario will allow for wireless access points (WAPs) to be connected to the existing wired network allowing employees with wireless devices the ability to access the company’s network. This is a commonly used method of enhancing an existing wired network while adding the benefit of mobility to employees and is a cost-effective way to upgrade to a wireless local area network (WLAN). On-the-go employees can potentially improve job productivity while in the Conference Center by having the ability to wirelessly access company printers, file servers, and Internet and/or Intranet without the need to plug into the company network.…

    • 2305 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    With any network, including a WLAN, there are inherent risks involved. With a WLAN, the wireless aspect opens up additional avenues for hackers or data being compromised. There could be tech-savvy students who could access the network and get into data that they shouldn’t see or modify. A student could obtain the teachers credentials by simply looking over their shoulder or watching them. Also, any outside entities could get within range of the wireless and access the network, if they’re good enough. Wireless can be easily intercepted and accessed.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure…

    • 900 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    You need to install a wireless network for a coffee shop. They require certain network devices such as a firewall, router computers etc. It is a coffee shop where they want a wireless access point for their customers to login while drinking coffee. They have an Cisco approved wireless access point that you can use. They also require computers for front and back of desk. They require a server and hard drive backup with offsite storage capability.…

    • 944 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ip Camera Fixing

    • 497 Words
    • 2 Pages

    3)set WIFI security, security mode is “WPA Personal”, wpa Algorithms is “AES”, Wpa Share key is “ 123456abcd”, Group key renewal is “3600”.…

    • 497 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wifi

    • 338 Words
    • 2 Pages

    1. Open “Network and Sharing Center” 2. Click on “Manage wireless networks” from the Right side Bar. 3. Click “Add” and Select “Manually create a network Profile” 4. Enter the below settings a. Network name : students / staff b. Security Type : WPA Enterprise c. Encryption Type: AES d. Security Key : “leave it blank” 5. Click Next 6. Click “Change connection settings” 7. Select - Security Tab from the menu 8. Click Advanced settings – Tick Specify authentication mode 9. Select Cisco: PEAP and click Settings Button 10. Remove the following Tick Marks :…

    • 338 Words
    • 2 Pages
    Satisfactory Essays