Constructively respond to the following 3 Discussion board posts. Short responses necessary.
Constructively respond to the following 3 Discussion board posts. Short responses necessary.
Constructively respond to the following 3 Discussion board posts. Short responses necessary.
The original question:
After watching the video, Wireless Security – Information Security Lesson #8 of 12 https://youtu.be/6pYZ2N9y2fQ, discuss at least two wireless security concepts you learned from or found interesting in the video.
Post 1
I learned that wireless network cost less than wired communication systems. There is less overhead, and it cost less to maintain. In a wireless communication, you could have an access point that can range over a wide area. Meanwhile, in a cable system, you have to invest in installing cables which can be a complicated process.The downside is that wireless communication has a lot of security vulnerability and assessable to potential hackers, unlike cable where a hacker needs to physically hack into the wire in order to intercept information.
The wireless network can be easily intercepted by free software’s. There are areas called wardriving. Where hackers can take advantage of a weak system and use that as a hacking point. New technology such as WPA 2 improves security measures by having features like encryption, authentication, cryptology, and improved session. However, there are still weaknesses and ways around these improved measures. Man, in the middle is a way where a hacker can trick the network by changing the authentication from the original user to the hackers control. Further, the hacker can access the original user’s information.
My Question to the class?How do we protect ourselves from malicious hackers trying to hack into our system? Are there any recommended software’s the increases security? I use
How do we protect ourselves from malicious hackers trying to hack into our system? Are there any recommended software’s the increases security? I use Sophos on a mac but that more for viruses. Not sure what is the process on a phone in terms of protection.
Post 2
One concept I learned about for wireless network is that clients who use a wireless network must have a wireless network interface card (NIC) which supports the communication protocols being used by the wireless network. Each NIC has a media access control (MAC) address which serves as a unique identifier through which the NIC can be identified.
Another concept I learned about from the video is about wireless data frames. Wireless data transmitted in blocks is called wireless data frames. A wireless data frame is composed of three major parts: frame header, frame payload, and frame check sequence. The frame header is composed of many different attributes that the necessary in order to make wireless networking practical in a multi-user environment including the frame type (e.g. association frame, authentication frame), frame direction (e.g. frame being sent from client to wireless access point), fragmentation and order control ( this is necessary for sequence and order of each frame within a message ), encryption bit (tells you which encryption the frame uses), and MAC addresses (addresses of senders and receivers to make sure who the frame is met for).Frame payload is simply the actual data that is being communicated between the client and the wireless access point. Frame integrity check is used to verify the integrity of the frame to make sure the data frame was not modified or corrupted when in transit between the client and the wireless access point.
The video also discusses about different types of management frames. Some of the most important ones include Beacon frames, authentication/ deauthentication frames, and association/disassociation request frames.
Using wireless network can cause many security vulnerabilities such as: no physical access required, unknown network boundary being using other clients, threats to confidentiality, integrity, availability. and. Unencrypted data can easily be stolen among malicious parties due to the usage of unsecured wireless networks.
Post 3
One of security concepts I found interesting were Unknown Physical Boundaries. It never really occurred to me that a wireless network could be extended in range via piggybacking. I have always known what piggybacking was, just never thought of it as extending my range. Probably never really thought about it too much either because I have never left my network open either. Truth be told here I used to steal WiFi all the time years ago, I could never believe so many people would leave their networks wide open, but I was greatful. Had I thought of it I would have kept one device at the front of my house to connect and piggyback for the rest of the house, instead of having to sit in my living room every time I wanted WiFi.
The second concept was Unsecured Wireless Networks. I have always heard of people driving around looking for open networks, but I never heard of wardriving and tagging areas where WiFi networks were open. Now as I drive around neighborhoods I am going to be looking for those symbols. I will say these issues are getting less and less frequent mostly because now cable companies are providing the hardware needed to setup home WiFi and they are taking care of the simple security features for people and the most of the people going out of their way to buy their own equipment are much more knowledge these days about security.
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


