Preview

A Letter to a Friend About Wlan

Good Essays
Open Document
Open Document
586 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Letter to a Friend About Wlan
March 28, 2013

Dear Friend, I am glad that you are asking for my help to know more about security threats of wireless LAN. I just have learned in my Business Data Communications and Security class about these threats and how they could affect your business. Once you set your wireless network, you need to make sure that it is not available to be used by unauthorized people from both inside and outside your company. You can fix such an issue by changing the primary user name and password of access point and the router. Doing so help prevent unauthorized persons from connecting to the network by guessing the user name and password that were set by the manufacturer. You also should be careful of those vandals and hackers who can capture and read your company’s data that sent over the air. They can do this easily just by sitting outside your place. But don’t worry about that, I can tell you how to protect your network from this threat. You may need to activate the encryption feature. That is to prevent unauthorized persons from picking up signals and thus detecting the sent data. One of the most serious threats that will be followed by a negative impact on your company and your overall business is that hackers can easily breakthrough wireless networks readily by primitive penetrating software. This allows them to send malicious traffic into your network and badly affect your business processes and their related data. So, one of the ways to reduce this potential dangerous is installing a firewall to prevent hackers form reaching your network, and to protect your network from any unwanted or unauthorized people to contact to your network since it will hide it. In this case, I recommend to you one of the best firewalls, which is also free, ZoneAlarm, and it can be downloaded from their website http://www.zonelabs.com/. You should know my friend that in each wireless network there is one or more access points. It is a device that allows wireless devices to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It241 Final

    • 446 Words
    • 2 Pages

    In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    planned expansion into the east coast. One of the threats identified was the vulnerability of the…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the LAN domain, multiple intrusion detection/prevention systems should be utilized to scan network traffic to make sure no unauthorized access is occurring. The LAN should also be set up to scan incoming emails, as well as having a server level virus scanner. Since this LAN also has wireless access points, the Aps need to be configured with wireless encryption to protect the data transfers there, and they need to be configured to only allow authorized computers to access them, perhaps by way of MAC filtering.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    You don’t want your neighbors or street boys use your internet connection as you are paying yourself and if they get access to the network they might have access to your browsing history and data you stored locally.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    For a business setting up a WLAN security is very important and should be top priority. If you do not secure your WLAN you are opening your business up to hackers that can ruin your business. Before you set up the WLAN a site survey should be done. This will determine what level of exposure your company is at and help decide how much security is needed.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    A wireless access point (WAP) is a device that usually connects to a router and acts like a switch. WAPs utilise wifi to connect to devices to allow communication between them. WAPs are used to extend the wireless reach of a network or to allow wireless access to that network. Unlike a router or switch, the WAP does not filter data and has no inbuilt firewall, so does not add to the security of the…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays