This website uses cookies to ensure you have the best experience. Learn more

Wlan Security Essay

518 words - 3 pages

Two ways to secure a WLAN, and the ramification if the WLAN is breached.
Sebastian Bach

Two ways to secure a WLAN, and the ramification if the WLAN is breached.

There is an added vulnerability when securing a WLAN than there is with a LAN. The multitude of packets floating around going from one or more access points to a variety of electronic devices can be a tempting arena for those wanting to gain illicit access. There are several ways to increase the security level of a WLAN. The most basic of these would be a router with an integrated firewall. This is almost exclusively found in residential settings. Keeping to the same architecture, firewalls can be quite complex in their modus operandi. Where basic firewalls work on ...view middle of the document...

Another method of making a WLAN secure is to encrypt data that is on the network. If this is done, the users will authenticated, which will yet again further strengthen the WLAN. For this it is recommended to utilize either WPA or WPA 2 wireless encryption. In conjunction to the encryption, use VLAN or MAC address control lists, to further increase the level of difficulty for the hackers. If the security needs of an organization are such that they require these measures in their security plan, then it is almost certain that all communications, e-mails, files copied, files altered, files downloaded, and files accessed are recorded.
Another option for fortifying a WLAN is to change the default network name to something that has nothing to do with the company. This will make it more difficult for hackers to figure out. Implementing a secure access for guests will permit them very limited access to the network and the Internet, while keeping them isolated from any inner workings of the network. There are two other methods of increasing network security which are more obscure, yet still play an important role in the security of a WLAN. Ensure that the management ports are secure by way of a centralized port management. This is especially important in a large network. Hiding and securing access points play an important role in securing a WLAN. The consequences for a business not layering security on its’ WLAN can be denial of access, the gathering and loss of sensitive or vital data, the creation of a slave computer, spoofing, eavesdropping, and unauthorized access from within the network itself (Stallings, 2009).


Stallings, W. (2009). Business data communications (6th ed.). Upper Saddle River, NJ: Pearson.

Other Papers Like Wlan Security

Wireless Technologies Proposal Essay

906 words - 4 pages , the current phones have minimal functions. The proposed changes: An upgrade to a wireless local area network (WLAN) would offer Party Plates several benefits. Providing smart phones instead of current phones to the employees would also be valuable. With smart phones the employees would have several functions at their disposal that would make them more efficient. The pros and cons of proposed changes: Incorporating wireless technologies

Face Detetction Essay

1038 words - 5 pages scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of security as * There is a lack of security * The links in the network are not reliable * The system is not centralized, making the network administration difficult. * Network security has to be applied to individual computers on the network * Lack of centralized server to

Indp Part 2 Final

1798 words - 8 pages strategy to ensure latent free communications with the other hospitals on the WAN. The integration of site-to-site VPNs into the architecture will only work with the combination of Point-to-Point Protocol (PPP), Layer 2 Tunneling Protocol (L2TP), and Internet Protocol security (IPsec).Changing the bus topology to a ring will offset the congestion created by additional loads from wireless devices on the WLAN. This should offset the latency and

Finance for Christiana

609 words - 3 pages A wireless local area network (WLAN) is a wireless machine organize that connections two or more gadgets utilizing a wireless dispersion system (regularly spread-range or OFDM radio) inside a constrained region, for example, a home, school, machine research centre, or office building. This gives clients the capacity to move around inside a nearby scope zone & still be joined with the system, & can give an association with the more

Wireless Technology and Convergence

3742 words - 15 pages Wireless Technology and Convergence NETW-471/Advanced Topics in Networking Ronald Webb Online Fall 2008 Session B Jason Strickland February 8, 2009 Table of Contents Introduction to Wireless 2 Overview of the IEEE 802.11 Standard 3 Wireless Technologies 3 IEEE 802.11 3 HiperLAN 4 HomeRF SWAP 5 Bluetooth 6 Advantages and Disadvantages of Wireless 7 Security 10 The Hacking Threat 10 WLAN Security 11

Mgmt T Information System Review

602 words - 3 pages attractive compared to 802.11i because many older devices can be upgraded to wpa. Access points take packets from wireless devices and send them on to devices on the wired lan. They also do the opposite . Wlan users are mobile so wlans use omnidirectional antennas. Speed spectrum transmission is used in wlans for security reasons. False. An unauthorized internal access point is a rogue access point. If an 802.11a wlan has a throughput of 23 mbps

Lab 1 Deliverables File

577 words - 3 pages . User Domain: Any user, worker, employee, contractor, or individual. They are considered to be the weakest link in IT security and the risk. B. Workstation Domain: The work station, client or standalone home system. The risk is Hackers use malicious software known as malware. C. LAN Domain: The private LAN, from SOHO’s to large corporations. To protect this domain it must be inside of a firewall if it does not have a firewall it is vulnerable

Is3120 Final Project

363 words - 2 pages latest IEEE 802 series of standards. In keeping with these standards NCIF has installed and configured a Local Area Network (LAN) using the IEEE 802.3 Series of standards and a Wireless LAN (WLAN) using the IEEE 802.11 Series of standards. NCIF’s network architecture consists of a client-server configured Local Area Network (LAN) based on a Gigabit Ethernet Star Topology or 1000 Base-X IEEE 802.3 Standard with Carrier Sense Multiple Access

Nt1210 Final Exam Notes

1350 words - 6 pages vast improvement since the IEEE first took over the Ethernet standardization process in 1980. The earliest improvements to Ethernet, in the 1980s, focused on cabling and topology. 231 Transmit on Pins 1, 2 | Receive on Pins 3, 6 – UTP unshielded twisted pair 258 To truly answer the question of the range for a particular WLAN, the network engineer needs to do some testing called a wireless site survey (site survey). The theoretical answer to the

Title Is Awesome

1179 words - 5 pages IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to

Wireless Network

2018 words - 9 pages will enhance the security of the network in the organization. There are different tools that minimize security threats of WLAN. One of the tools is AirDefence (AirDefense, 2002). This is a system that detects, protects and network vulnerable from hackers and intruders. Likewise, the system assists wireless management in an organization. The system provides robust wireless management which allows users to enforce, monitor and understand the

Related Essays

How To Plan For Security Essay

1935 words - 8 pages How to Plan for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise

Wireless On The Move Essay

2311 words - 10 pages specialize in IT support (on-site and remote), Managed Services, LAN/WAN network installation & integration, and Network security.” (Dataprise) * Industry Given the rather dismal economic situation that continues to prevail across the globe, the Wlan market continues to be a beacon of hope. “With revenues of around $ 1.5 billion, the Wireless Local Area Network (Wlan) technology is no longer a ‘fad’; it is now part of mainstream

Cis: Network Design Paper

1188 words - 5 pages multiple servers and a server can service multiple clients.” The client can be one or more and the servers also, more than one client can send request to the servers and the server will send back the response the all the clients as per their requests. LAN vs WLAN WLAN stands for wireless local area network. This is a type of network where the data is not transmitted via cables but over the air through the use of wireless transmitters and

Tm586 Project Paper

2852 words - 12 pages  sufficient for fostering a maximum state of security within a WLAN. Bear in mind, issues addressed here will necessarily involve topics specific to other TCOs. Consequently, the integrated nature of their contents requires they are at least made mention of, if only in connection to those of central focus, otherwise, they will be given no priority. The intention here, is to present the most plausible method and means by which the specified WLAN may