create discrete action steps to proactively build  your professional identity?
September 17, 2021
mkt565midterm help
September 17, 2021

issc343 discussion response high speed wlans and wlan security

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

You will:

  1. Describe the differences between authentication and privacy
  2. Describe how WLANS can protect both

Student one:

Hello everyone,

There are many attacks that could be initiated on wireless local area networks (WLAN). Some examples of these attacks are MAC spoofing, Denial of Service (DoS) or Distributed Denial of Service (DDoS), man in the middle, and social engineering to name a few. Any device that is connected at any given time to the internet is by nature susceptible to being attacked and breached by unauthorized users. Users need to be verified that they can have permission to access the network, in other words authenticated. This would be one of the first steps in helping deter unwanted guests on a secure network. Another initial step is to encrypt or scramble one’s own data being transmitted as much as possible, this being the privacy of the network.

Wired Equivalent Privacy (WEP), standard 802.11-1997, was great in its time initially, but since then it has been outdated as technology has advanced. Currently, Wi-Fi Protected Access version 2 (WPA2) is the most up to date protocol against WLAN attacks. Along with WPA2, using Virtual Private Networks (VPN) with unsecured Wi-Fi and upgrading all hardware and software as soon as possible will always help deter and lessen unwanted guests and their attacks on WLANs. Another helpful tip is to change the default SSID and passwords of routers and adding long and complex passwords. In a business setting, keeping up in awareness meetings will also help against phishing attacks.

Thank you again for reading. I am sure I left somethings out at the moment, and would appreciate feedback.

-Andres

References

(2019, 06). Wireless Security Protocols: WEP, WPA, WPA2, and WPA3. Retrieved 06, 2019, from https://www.netspotapp.com/wifi-encryption-and-security.html

Karasek, J. (2019, 01). Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping. Retrieved 01, 2019, fromhttps://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/security-101-protecting-wi-fi-networks-against-hacking-and-eavesdropping

Student two:

Hello classmates!

“Authentication is the process of verifying that the client device has permission to access the network.” (Olenewa 2014). Having said this, it’s just like what it sounds. Authentication requires the user to pass some preliminary barrier before gaining access to the specified device or network. Password protection is the most common form of authentication when it comes to devices and network protection. Networks and devices vary; some require authentication from the same user every time the device or network is accessed and some require only a one time authentication. Privacy is different from authentication because authentication just ensures that the user has permission to be connected to the network. “Privacy is a collection of processes that attempts to ensure that unauthorized users cannot understand wireless transmissions.” (Olenewa 2014). These Privacy processes utilize data encryption so unauthorized users can’t understand or decode anything unless they have the encryption key.

WLAN connections utilize both authentication and privacy methods. To connect to a specified WLAN connection, a secure network requires the correct authentication password to connect to it. Oftentimes this password is unique and complicated to keep it more secure and out of reach from unauthorized users. Different connection use different bit type pre shared encryption keys based on the type of connection that the device is using. In addition, some devices rotate encryption keys after a certain amount of time. Thanks for reading my post this week, good luck to everyone on all there assignments this week!

Reference” Olenewa, J. Guide to Wireless Communications. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/97812857002…

-Paden

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.



Buy Custom Nursing Papers

"Are you looking for this answer? We can Help click Order Now"