Reference no: EM132240595
Question: Provide a 50-75 word discussion reply to the following post below.
Setting up the proper security for a wireless network at a business can be difficult to do for multiple reasons. There are a few major things to consider when doing so to allow for the most optimal performance as well as security. One of the more important things to keep in mind is to use Enterprise WPA2. Doing this will allow an easy way to revoke an employee's user log-ins. Another important measure to take, which may sound ridiculous, is to have the proper physical security in place. This means locking the wiring closets and any equipment that is at risk to be tampered with. The last considerations I will touch on, among many, is to keep the software and any equipment up to date. This can mean performing regular updates, or routine upgrades of equipment.
Security breaches are not an uncommon occurrence nowadays. A pretty common breach that happened in February of 2018 was a breach of Under Armour's MyFitnessPal app which compromised many usernames, email addresses, and passwords. The intrusion was realized by Under Armour until March 25 of the same year. It then came out that Under Armour had used a hashing scheme called SHA-1 which had known flaws. Under Armour obviously stopped using SHA-1 to hash passwords and went to using bcrypt. This was a reminder for many people that corporate networks do not always use the best options out there.
References: Newman, L. H. (2018, July 11). The Worst Cybersecurity Breaches of 2018 So Far.
Parsons, Shaffer, Carey, Parsons, Oja, & Finnegan. (2015). IT 221: New Perspective on Computer Concepts 2016 Comprehensive + Microsoft Office 2013 Enhanced Edition 1st Course, 1st ed., Mason, Ohio: Cengage Learning.