Preview

week 8 WLAN checkpoint

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
week 8 WLAN checkpoint
WLAN Checkpoint student name
IT/242
November 7, 2013 instructor WLAN Checkpoint
For a business setting up a WLAN security is very important and should be top priority. If you do not secure your WLAN you are opening your business up to hackers that can ruin your business. Before you set up the WLAN a site survey should be done. This will determine what level of exposure your company is at and help decide how much security is needed.
Of the many ways to protect your WLAN you should start with changing all the default passwords on all your equipment. If you have a small business without many users and devices a MAC filtering system is a good choice. MAC filtering is where every MAC address for all devices allowed on the system are listed and if a device tries to get onto the system that is not on the list it will not be allowed. That is why smaller systems can keep up with this type of format.
Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.
After the site survey is done and the security measures are determined and implemented a business should feel confident in their WLAN. This being said, there is no such thing as a perfect security system and you should always be diligent and frequently check your system to make sure the security protocols set in place are still working for your business.

Reference
Business Data Communications: Infrastructure, Networking and Security, Seventh Edition, by William Stallings and Thomas Case. Published by Prentice Hall. Copyright © 2013 by Pearson Education, Inc.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    2. Setting a MAC filter is a good way to filter who has access to your network.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    Cost: Depending on how many wireless repeaters (signal amplifiers) you have installed, the cost of hardware is generally low, although you are strongly recommended to use the services of a wireless network expert in the selection and configuration of a wireless router. Commercial routers are generally more expensive, but are more stable and offer better security controls. A $99 router from Best Buy is not advisable.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It241 Final

    • 446 Words
    • 2 Pages

    In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2

    • 430 Words
    • 2 Pages

    3. What capabilities should a wireless security toolkit include? Definitely should be able sniff incoming packets, scan the wireless hosts, and be able to view the level of privacy. Keeping an eye on vulnerability is a must because wireless networks can be a little easier to breach especially if the right security measures are not implemented.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The deliverables for this project will consist of an inventory by location of the network in a Visio format, description of the security by location of the network, and recommendations for changes to the network design, circuit speeds, and reasons why the changes should be implemented.…

    • 5538 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will use WPA2 authentication for all wireless devices. WPA2 is important as it can be configured for any device including phones and wireless printers…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure…

    • 900 Words
    • 6 Pages
    Powerful Essays