Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Using a Word or any other word processing tool complete the following essay. A f

ID: 3913407 • Letter: U

Question

Using a Word or any other word processing tool complete the following essay.  

A friend is interested in installing a wireless LAN in their small business. They have about a dozen employees. They are concerned about security. Write a one-page memo/letter to explain what security threats they are facing and how they can reduce these threats. Remember that you are writing for a friend, not for a teacher. Do not hand in disorganized notes. Double spacing is good and professionalism is always accepted.

Explanation / Answer

Answer)

Setting up a wireless LAN in a small business is always a good idea to interconnect the devices and manage the working in the business. But information security should be a primary concern while connecting devices to the wireless LAN network as the Internet and the wireless network can be a pretty unsafe network to use and connecting to it can have information security issues and leaks. Thus, securing a wireless network should be the primary concern before using the wireless LAN in the small business. An unsecured or minimally secured wireless LAN can face many security issues such as:

a) Setting up of rogue access points by targeting the wireless LAN of the business to target the users of the wireless LAN and to fool them to connect their devices to this rogue access point appearing legitimate. This can cause the attacker to capture data from the wireless LAN in the network.

b) Another threat is the DOS (Denial of Service) Attack where a large amount of flooding of traffic is sent to the target and this causes the network to limit access to the services or get slow or unresponsive or crash.

c) There can also be many configuration problems where the access point implement no security configuration and setup using default values, also many users in Wireless LANs use weak security arrangements as weak passwords, default SSID etc. to make it easier to attack the network and compromise data.

d) Eavesdropping on the Wireless LAN by eavesdroppers, who listen to the wireless transmissions and can pickup encrypted and unencrypted messages and thus using packet sniffers and other tools attackers and eavesdroppers can have access to the company’s business traffic, getting hold of the packet, analyzing it and also getting the data inside the packet thus compromising the data flow in the network.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote