Emerging threats and counter measures responses

Assignment Help Basic Computer Science
Reference no: EM132819197

Discussion 1:

Which is commonly known at WLAN is extension to LAN (local area network ), which provides enhanced user mobility and net work access (Cyrus, T. Et al). It consists of group of network nodes which can communication radio communication in home, office or building campus. It is legacy technology is use very less. Securing any system should meet some basic fundamentals of security. Authentication, integrity and confidentiality are the basic aspects those needs to be provided to secure the system. There are two ways 802.11 provides authentication, open-system and shared key.

Open system is not trusty authentication mechanism, the reason is it only accepts the MAC address for authentication, which can be spoofed and is not verified. Shared-key involves AP(access point) sending some sort of challenge to client , then client generates the response for the challenge and sends it back. AP validates the response and compares with the challenge sent. This was a shared secret can validate that it was only sent to client and not other party. WEP (wired equivalent privacy) is the algorithm security algorithm for 802.11 . It gives confidentiality , integrity and authentication to 802.11. WEP gives RC4 cypher algorithm to encrypt the communication. It only support 40 bit key. Private vendor might support longer keys , but its not part of the standard.

Reference :

Cyrus, T., Scarfone, K., Dicoi,D.,Sexton, M. Guide to securing legacy wireless 802.11 wireless networks. National Institute of Standard Technology.

Discussion 2:

The various wireless technologies to maximize the use of available radio frequencies were WiMAX and Wi-Fi. Worldwide interoperability microwave access (WiMAX) is a rapidly growing IP-based wireless technology that offers easily realizable promises to deliver voice, data, and video signals over the internet throughout the world, including rural communities of emerging nations. (Abate, 2009) It comprises a WiMAX base station (BS) and customer premise equipment (CPE) for indoor service, and a mobile unit or modem for outdoor service. WiMAX BS theoretically covers a range of up to 30 miles, but it is really limited to a more practical range of 6 miles. Wi-Fi is a well-known wireless network that allows devices such as computers, phones and other equipment like printers and video cameras to connect with the Internet. It allows these devices and many more to exchange information with one another, creating a network.

The different methods that can be used to secure wireless networking were described below:

Use stronger encryption

Use a secure WPA password

Check for rogue Wi-Fi access points

Provide a separate network for guests

Hide your network name

Use a firewall

Enable MAC authentication for your users

Use a VPN

Reference:

Abate, Z. (2009). WiMax RF Systems Engineering. Artech House, Inc.

Reference no: EM132819197

Questions Cloud

What total amount shall be included in the income statement : The five lease payments are discounted at 10% over the lease term. What total amount shall be included in the income statement for the year 2018
Ethical dilemmas faced by business organizations : Lynas Corporation Ltd of Australia is building a rare earth processing plant called Lynas Advanced Materials Plant (LAMP) which is currently under construction
Find what amount martin company report as dividend income : Martin received P600,000 cash dividend from Paul Company. What amount should Martin Company report as dividend income for the current year?
Delineate the motivation and reward system : What are the areas/target markets where you would like to sell? Develop a Sales organization structure for a territory.
Emerging threats and counter measures responses : Which is commonly known at WLAN is extension to LAN (local area network ), which provides enhanced user mobility and net work access
What would winnebago industries inc ending inventory : Winnebago Industries, Inc. is a leading manufacturer of motor homes. What would Winnebago Industries, Inc.'s ending inventory have been if it had used FIFO
Describe the ethics of current employer : Have you observed any conflicts at your workplace within your workplace triggered by the perception of fairness?
Does the option to abandon change firm decision to accept : Does the option to abandon change the firm's decision to accept the project? If each outcome is equally likely, what is the expected NPV?
Benefits and drawbacks of instant messaging : What are some of the benefits and drawbacks of Instant Messaging and Texting on work field? Has this impact within your work environment? how so?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd