Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Hands-On Project 7-3: Researching Security Products for Handheld Devices Time Re

ID: 3730163 • Letter: H

Question

Hands-On Project 7-3: Researching Security Products for Handheld Devices

Time Required: 30 minutes

Objective: Research ways to implement security for handheld devices.

Description: In this project, you research products that can help you implement company security policies for wireless handheld devices.

1. Review the list of best practices from the “Best Practices for Wireless Network Security” section earlier in this chapter.

2. Select three of the best practices, and then search online for products that you can use to implement these practices. Identify three different products that can enforce one best practice each.

3. Write a report that lists the three best practices you chose and the products that enforce these practices. Describe the advantages and disadvantages of each solution.

4. Submit the report to your instructor, and be prepared to discuss your findings in class.

Explanation / Answer

Best Practices for Wireless Network Security

Best Practices

1. Wireless intrusion detection systems: These devices monitor and detect more targeted and nefarious WLAN attacks that use techniques such as AP spoofing, malicious broadcasts, and packet floods. WIPS can stop WLAN threats quickly so as to prevent unauthorized access to WLANs and client devices. WIPS solutions:

1. Cisco Adaptive Wireless IPS: Cisco Adaptive Wireless IPS is designed to monitor an organization's wireless local area networks for any indications of security policy violations or other security problems. It can support the availability of the WLAN, as well as prevent some compromises of its client devices and speed detection of compromises that cannot be stopped, thus reducing the negative impact to the organization's sensitive data.

Advantages:

            Disadvantages:

2. Fluke Networks AirMagnet Enterprise: AirMagnet Enterprise can monitor WLAN events and detect a wide variety of potential problems. These include rogue wireless access points, unauthorized WLAN client devices and various WLAN-based attacks.

Advantages:

            Disadvantages:

            3. Mojo AirTight WIPS: It is an enterprise wireless intrusion prevention system product that monitors network activity involving wireless local area networks. The AirTight WIPS looks for any WLAN-based attacks, rogue wireless access points and other violations of the organization's WLAN and security policies. A WIPS not only can detect inappropriate activity, but it can also stop it from negatively affecting the organization's WLAN infrastructure, client devices and users.

            Advantages:

            Disadvantages:

2. Mobile Device Management Systems: It provides the ability to quarantine devices that don’t meet set security standards, limit application installations, and implement data loss prevention.

            Advantages:

            Disadvantages:

2. Citrix XenMobile: It is the best solution available in the market at present. It runs on almost all the platforms and provides a very robust system to device management.

            Advantages:

            Disadvantages:

      3. Microsoft Intune: Microsoft provide a complete solution to mobile device management which monitors the handheld devices and informs the users in case of faults.

            Advantages:

            Disadvantages:

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at drjack9650@gmail.com
Chat Now And Get Quote