Objectives
By the end of this unit, the participant will be able to:
* Understand the need for wireless security * Check wireless connectivity from a public area * Understand war chalking and evil-twin intercept * Recognize the setting up of a wireless network in the workplace * Describe packets and how they work * Change the IP address and password for the router/switch * Enhance wireless security by encoding WEP and changing the key size * Enable the MAC filter and limit transactions * Decide when to turn off wireless capability * Turn off the service set identifier name * Disable remote configuration * Use a wireless network range extender * Create …show more content…
A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.
VPNs may also be appropriate in an academic setting. Although most dorms are networked, universities employ stringent firewall rules to restrict students from using their computers as a server to the outside world. The Internet control message protocol (ICMP) packets and other types of control packets are disabled on student-used networks. It appears the only way to do gaming is through a website or through VPNs to avoid affecting the servers/configuration/ports and data flow. A VPN can go in front of a firewall or behind it. For example, a VPN router/switch can go in front of the firewall on a …show more content…
He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.
The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.
Separation of