Preview

It-242 Wlan Check Point

Satisfactory Essays
Open Document
Open Document
265 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It-242 Wlan Check Point
WLAN CheckPoint
Matthew Henderson
IT-242
July 6, 2012
Jessica Partin-Sawyers

WLAN CheckPoint There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.

References

Stallings, W. (2009). Business Data Communications (6th



References: Stallings, W. (2009). Business Data Communications (6th ed.)

You May Also Find These Documents Helpful

  • Good Essays

    It273 Unit 3

    • 676 Words
    • 3 Pages

    | A hub is a device that takes incoming data and broadcasts it out to all the other devices that are connected to its ports.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    2. Setting a MAC filter is a good way to filter who has access to your network.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Today’s world is one that is driven by technology. It’s almost a “get on board or get left behind” situation. Getting dressed, driving to the mall, and walking around shopping are being replaced by staying in pajamas, walking to a computer, and shopping on Amazon.com. There are benefits to both situations but it’s up to choose how they would like to conduct business. As business men and women the situation can become a bit more complicated. The following examples help to clarify this statement.…

    • 972 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It241 Final

    • 446 Words
    • 2 Pages

    In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2

    • 430 Words
    • 2 Pages

    3. What capabilities should a wireless security toolkit include? Definitely should be able sniff incoming packets, scan the wireless hosts, and be able to view the level of privacy. Keeping an eye on vulnerability is a must because wireless networks can be a little easier to breach especially if the right security measures are not implemented.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    With any network, including a WLAN, there are inherent risks involved. With a WLAN, the wireless aspect opens up additional avenues for hackers or data being compromised. There could be tech-savvy students who could access the network and get into data that they shouldn’t see or modify. A student could obtain the teachers credentials by simply looking over their shoulder or watching them. Also, any outside entities could get within range of the wireless and access the network, if they’re good enough. Wireless can be easily intercepted and accessed.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Good Essays

    Examples of Free Wlan

    • 1696 Words
    • 7 Pages

    A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers or devices without using wires. WLAN uses spread-spectrum or OFDM modulation technology based on radio waves to enable communication between devices in a limited area, also known as the basic service set. This gives users the mobility to move around within a broad coverage area and still be connected to the network.…

    • 1696 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Wifi History

    • 461 Words
    • 2 Pages

    Despite the application of techniques such as Wired Equivalent Privacy (WEP) or the newer WiFi Protected Access (WPA) encryption, hiding the system's Service Set IDentifier (SSID) and Media Access Control (MAC) address filtering, wireless technology…

    • 461 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I am glad that you are asking for my help to know more about security threats of wireless LAN. I just have learned in my Business Data Communications and Security class about these threats and how they could affect your business. Once you set your wireless network, you need to make sure that it is not available to be used by unauthorized people from both inside and outside your company. You can fix such an issue by changing the primary user name and password of access point and the router. Doing so help prevent unauthorized persons from connecting to the network by guessing the user name and password that were set by the manufacturer. You also should be careful of those vandals and hackers who can capture and read your company’s data that sent over the air. They can do this easily just by sitting outside your place. But don’t worry about that, I can tell you how to protect your network from this threat. You may need to activate the encryption feature. That is to prevent unauthorized persons from picking up signals and thus detecting the sent data.…

    • 586 Words
    • 3 Pages
    Good Essays