Premium Essay

P3410 Wireless Security

Submitted By
Words 1428
Pages 6
1. What common security system is an IDPS most like? In what ways are these systems similar?
P293 IDPS (Intrusion Detection/Prevention Systems) are most like a burglary alarm or other type of situation where one is alerted of an attack. Burglar alarms and IDPS are similar in that they both use any means possible to alert ‘you’; such as noise and lights, silent (via email or pager alert).
2. How does a false positive alarm differ from a false negative one? From a security perspective, which is least desirable?
P294 A false negative alarm fails to react to an attack event where a false positive reacts when there is no threat. In my opinion, I would say a false positive is least desirable because the admins or those in charge of following the IDPS ‘lead’ becomes lackadaisical in performance because they begin to ignore the TRUE attacks.
3. …show more content…
What capabilities should a wireless security toolkit include?
P339-340 A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network.
16. What is biometric authentication? What does the term biometric mean?
P341 Biometric authentication uses measurable human characteristics or traits to authenticate the identity of a proposed systems user. “Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.” (Rouse, 2000-2017)
17. Are any biometric recognition characteristics considered more reliable others? Which are the most reliable?
P341 Only three human characteristics are usually considered truly unique: iris, retina, and fingerprint. As per Table 7-3 in our book, fingerprint is the most reliable characteristic.
18. What is a false reject rate? What is a false accept rate? What is their relationship to the crossover error

Similar Documents

Free Essay

Network Trpubleshooting

...Wireless Security Submitted on CS 571 Network System Administration Professor Mitch Cochran Wireless Security Write-up Assignment 2 California University of Management and Sciences Spring Quarter 2015 Submitted by Prasad Gundu G134013 WIFI SECURITY Many organizations and users have discovered that wireless communications and devices are helpful, adaptable and simple to use. Users of Wireless local network devices have flexibility to movie their smart devices one spot to another inside their workplaces while keeping up network with the system. Wireless personal networks permit users to share the information and applications to system networks and different users with compatible devices, without being fixed to printer cables and other peripheral device connections. Users of handheld gadgets, for example, individual computerized partners (PDAs) and phones can synchronize information in the middle of PDAs and PCs and can utilize system administrations, for example, wireless email, web browsing, and Internet access. Further, wireless network connections can help associations cut their wiring costs. What is the Risk? Wireless networks and handheld devices are Vulnerable against a large number of the same risks as conventional wired systems. Intruders who get access to information systems by means of wireless networks can bypass firewall security. When they have access to systems, intruders can launch denial of service attacks, steal personal information, violate the...

Words: 917 - Pages: 4

Premium Essay

Proposal for Implementing

...Proposal for Implementing Wireless Technologies Objective The objective is to provide a successful implementation of wireless technology that will work well and bring continued success to the growth of our company. Goals Our goal is to implement wireless technologies such as tablets and mobile broadband to allow more effective lines of communication with customers and employees which will increase revenue and productivity to allow continued growth. Benefits of Implementing Implementing wireless technologies into the Party Plates organization has many benefits utilizing such devices as the vast varieties of tablets and hot spot Wi-Fi systems. A few uses with the tablet are as follows the use within “sales support” is vital and can help boost accessibility to the sales representative and give an easier and very mobile use of a sales tool increasing productivity and marketing. As well as giving a new touch to product showcasing one can use a tablet to give a “customer presentation” either through a power point slide or a comprehensive in depth view of our many products and design customizations. Another wireless technology to be considered to implement into Party Plates is the use of wireless hot spot Wi-Fi, in the office many employees are confined to desktop computers. While the use of the Wi-Fi hotspot can allow office-based employees can network and collaborate while away from work, such as home to access corporate data while with customers on site. This is...

Words: 692 - Pages: 3

Premium Essay

Wpa2 Wireless Encryption

...WPA2 Wireless Encryption Security By Charles Miller TS8004: WPA2 Wireless encryption Abstract The purpose of this research paper is to explore technologies best suited for wireless security technologies. The paper in itself will include research into WP2 Technology and how it fits in making best security measures for an organization. When an organization implements wireless technology, the aspect of keeping communications secured from sources that could use this information being transferred wireless to gain financial information, market advantage and personal gain is a concern for security involvement and risk. This literary review explores a security involved in WPA2 wireless encryption technology. Table of Contents Abstract.......................................................................................................................................... 2 Table of Contents........................................................................................................................... 3 Introduction....................................................................................................................................4 Background.................................................................................................................................... 5 Problem Definition......................................................................................................................... 5 Vulnerabilities..............

Words: 974 - Pages: 4

Free Essay

Business and Finance 5200

...'Ethical hacker' reveals trade secrets What comes to mind when you think of wireless Web surfing? It may not be security, or lack of it. There are nearly 30,000 public wireless "hot spots" in the United States at places such as parks and cafes, but there's more to consider than just where to log on. The convenience comes with a caveat. "Understand that the information you're sending is very similar to standing up here in the park and shouting out all the information -- would I normally do that?" said Richard Rushing, a wireless expert with security firm Air Defense who visited an Atlanta park to show security vunerabilities. Rushing is considered an "ethical hacker" and works with companies to strengthen their wireless networks. He said many people don't realize they could have all their personal data stolen while checking out their checking account. "It's great to be able to sit somewhere and work without having any wires attached, no nothing attached, but you have that risk that it comes back to," Rushing said. At the park, Rushing was able to log onto an unsecured hotel wireless signal in a matter of seconds. To illustrate how vulnerable such networks can be, Rushing then sent an e-mail and intercepted the entire contents of the message. He could've done the same thing to any of the dozens of people sitting nearby in the park. "At any point in time, I can reach out and touch everyone's laptop at the hot spot, and there's usually not any way of preventing...

Words: 487 - Pages: 2

Free Essay

It 241 Appendix a

...the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements: • Deployment scenario • IEEE wireless network type • Access point management • Location of wireless devices • Wireless security policy Final Project Timeline Budget your time wisely and work on your project throughout the course. Some of the discussion questions, CheckPoints, and assignments in the course will assist you in creating your final project. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to complete your project successfully. □ Suggested in Week One: Read the Final Project Overview and Timeline in Appendix A. Review Appendix I and Appendix J. □ Suggested in Week Three: Begin to identify the hardware components that your network may use based on the list of components compiled in the Wireless Network Components assignment. You will not be able to finalize this list until you select the floor plan on which your network will be based. Research the cost of each component from the Wireless Network Components...

Words: 446 - Pages: 2

Premium Essay

Wireless Networks & Network Security

...Wireless Networks & Network Security ISSC 340 Professor Vijay Venkatesh James Lange 08/13/2013 Wireless Networks are somewhat new technology in comparison to the know-how that makes them possible. The knowledge regarding wireless technology goes back about 200 years. One of the first individuals deserving recognition for today’s wireless networks is a scientist, inventor and politician named Benjamin Franklin. In 1747 he had built a model that showed how electricity could move through the air unaided by any type of wiring. In the early 1750’s Mr. Franklin started experimenting with electricity and the rest is history. Franklin was under the belief that lightening was an electrical current. So with the famous kite and key experiment he proved to himself and others that he was right. His fascination with electricity led him to later experiments with an electrical tube given to him by a friend. A second individual that played a part in today’s wireless technology is Hans Christian Oersted. In 1819 he had found that a compass needle had movement if it was presented with electrical current. This relationship between the needle and the electricity is an essential part of electromagnetism. It is said that this discovery by Oersted happened completely by chance. While preparing for one of his lectures he was setting up some of his equipment. The compass and battery were in close proximity to each other and the needle moved from magnetic north whenever the switch to the...

Words: 3213 - Pages: 13

Premium Essay

Pki and Wireless Security

...PKI and Wireless Security There are several advantages of using a commercial PKI rather than implementing such a capability in-house with the software developers you already have. While in-house PKI solution can highly cost an organization with licenses and necessary infrastructure, a commercial PKI solution offers a service package with reliability, strong support, and indemnification. Considering an in-house PKI structure, a company must factor in the cost of setting up a network infrastructure, network security, storage, redundancy, backup, and maintenance. Compare that to a commercial PKI solution, it is considered more profitable in the long run to pay for the service and not worry about all the factors above. It is mainly the control ability that drives companies toward an in-house PKI solution. In return, in-house PKI costs rise because it requires a separate security model including hardware storage solution in order to contain certificate repositories and public keys. The additional security model includes server, router, firewall, and IDS to keep hackers out. Additional software associated with a PKI infrastructure includes operating system for the server, Microsoft Certificate Server software or commercial based software, licensing, and secure backups. Due to the higher level of security requirements associated with PKI structures and private keys, the secure backups would be separated from the everyday backups found in a standard corporate backup system...

Words: 841 - Pages: 4

Free Essay

Wlan Security

...electronic devices can be a tempting arena for those wanting to gain illicit access. There are several ways to increase the security level of a WLAN. The most basic of these would be a router with an integrated firewall. This is almost exclusively found in residential settings. Keeping to the same architecture, firewalls can be quite complex in their modus operandi. Where basic firewalls work on the first three or four layers of the OSI model, the more complex firewalls operate on all seven levels of the OSI model. Often times accompanying these higher end firewalls, there is what is known as a bastion. A bastion is located on the public side of the firewall and acts as bait for would be attackers. The thought behind a bastion is to get the would-be attackers to go there, thinking they have accessed the protected network. Bastions are completely unguarded to make this process easier. Another method of making a WLAN secure is to encrypt data that is on the network. If this is done, the users will authenticated, which will yet again further strengthen the WLAN. For this it is recommended to utilize either WPA or WPA 2 wireless encryption. In conjunction to the encryption, use VLAN or MAC address control lists, to further increase the level of difficulty for the hackers. If the security needs of an organization are such that they require these measures in their security plan, then it is almost certain that all communications, e-mails, files copied, files altered, files downloaded, and files...

Words: 504 - Pages: 3