CSG 5308 Wireless Security - Free samples to Students
Another concern that was mentioned by The Rare Vintage Auto Parts Ltd personnel was that the intermittency between Kalamunda and Joondalup store was more frequent. Connectivity to the Bayswater inventory is reliable but there are now errors in shipment because of an untraceable error. Orders arrive in correct order but when the automated deliveries are sent out quantities are wrong for 60% of orders causing massive restocking costs and loss of reputation.
Answer:
Introduction
For the enthusiastic motorists, dealerships of car, mining industries and for the car mechanics the automotive parts are supplied by the Rare Vintage Auto Parts Ltd. The sources of these stocks are from four offices and one warehouse. The inventory system has been currently located in this warehouse which is accessed with 512kbit lines that are fixed and expensive. As per the below map the shops which is not to scale are geo-graphically extended. For the quick accessing of the shipping parts to the clients, Kalamunda, Cottesloe, Bayswater (being the main office) and Joondalup. There are some issues for the smooth running of the business recently in Rare Vintage Auto Parts Limited. The boss will assign to assess and made a report on the strategies of resolution for the clients-i.e. Rare Vintage Auto Parts Limited. With more or less one fifty employees the Rare Vintage Auto Parts limited business is obtaining the basic turnover of more than 48 million dollars per year. Transactions are made through the credit card for the business revenue more than 50 percentage. The wireless network connections are made for the communications to take place within the organization network for the tills in the Bayswater (store and main head office). Since the business has been located in a heritage listed building, the wireless network connections are provided for the tills to communicate within the organization. The wired network connections is also provided for the Cockburn Central Store but it also has wireless connections for the tills in the Bayswater to communicate within the organization network. Wireless link acts as medium for storing both the network to the Head office of the Bayswater and the shop for the inventory. In excess, the access points are seem to be available at each store so that the handheld devices (such as smart devices, PDAs etc.) can be used by the staffs So that In the office itself the managers can use their laptops for taking the inventories and the another access point(AP). The Rare Vintage Auto Parts Ltd was stated one more cover personnel that was fitful in the middle of Kalamunda and Joondalup which was more recurrent. There are now mistakes in shipment because there is unfindable mistakes in shipment but connectedness with the Bays water is genuine. Most of the times the arrival of orders are in correct manner but sometimes if the deliveries dispersion quantities are mistake for the orders of 55% reasoning huge replacing amount and dropping of character. The owner trusts the ex-Information technology administrator is back bone for instructing wireless systems, links, tills and formation of the mobile network where it is included in main head office/store which is used to communicate wirelessly. The details cannot be able to respond by Police. The person promoting the point with the system of SQL inventory had not been able to furnish any data to analyze the shipping mistakes. The passwords of the account are secured and cannot be traceable anymore. Details of installation parts of wireless in current system was showed below. The info added beneath was the only info which was remain after in a file by the ex-Information Technology administrator create in one of the folder case. The sites in the system are using more than 15 Dpi Omni-directional antenna's with more than 16 m towers of exact 2 W injectors tha
t is attached with the 200 mile watt Aps (Linksys WRT54G). Managerial AP at 100 mille Watt with more than 1150 series. Inventory AP has Net gear WG602 with more than 5 decibels antenna at 100 mille Watt (Wu & Hui, 2004).The cards which are mobility are associate of 802.11b and g from Net gear, Proximal and D Link. Some of the mobility tills are there. It is used by WEP Encryption. SSID is broadcasting and Rare Vintage Auto parts Ltd. There is no firewall, VPN and there is no countermeasure except the protection of virus. The infrastructures in the network is running on 172.16.0.0/16. In this company the previous month, an IT administrator has been packed by the company after his third warning because he was continuously accessing the illicit material. The police had to eject The IT administrator from his premises and the IT administrator was feeling opposition. Later that, the Cottesloe shops network became unserviceable because after packing the previous IT administrator, for the mean time they made another person who is an senior manager in that company who was with poor IT knowledge. So after that afternoon the Cottesloe shops network became unserviceable.
Security of wireless networks
Each and every network connection that must need security system. Unless the system was misused by the attackers. So the need of systematic operating procedures and policies are governed. They are known as security of wireless connection system (Addaim, Kherras & Guennoun, 2017). The first and foremost duty of this system was to protect the network systems from the attacks conducted by the attackers (Toh, 2018). That system provides the security for the devices connected with the system like routers, switches and etc. This system try’s to prevent the attacks caused by the attackers. This system provides the security for the computers. Here it has some algorithms and setoff policies to do its function. This system was also used in the many form of the wireless communications like Wi-Fi, Bluetooth etc. Wireless network systems are the most common communication device used in the today scenario. So the need of implement the security systems for the wireless internet connections ("WiTuners’ Click & Tuned WLAN All-in-One Optimization", 2018).
Wireless encryption
This is the security system implemented in the wireless systems for authenticating purpose. This process gives the security password for the data (Ghazali, Baharun, Islam & Wada, 2018). So the authorized persons only can able to access that. Here there are two most common techniques are used for the encryption purpose. And they are Stream-Cipher & Block-cipher. The main purpose of those tools are encrypt the data and fix the size of the data ("Wireless Technologies Development:: Radio-Electronics.Com", 2018). For this purpose we use some kind of algorithms like rc4 and Des.
Here we would see about the standard used in the wireless networks. And they are listed below,
- WEP
- WPA2
- RADIO – FREQUENCY
- SECURE MOUNTING
- WPA
- ACCESS POINT
- SSID
- VPN
WEP – this is the RC4 based security protocol. That is commonly used for ensure the safety of the wireless networks.
WPA2 – this is also the security protocol employed in wireless security. It has the pre-defined key for authentication process. So the password cracking was too complicated in this protocol.
Radio-Frequency – this is used to guide the location for the various access points. They are obtained by the implementing the special devices.
Secure mounting – this used to mount the access points and also gives the physical protection. The implementation of this standard give the simple security for the network.
WPA – this is RC4 based protocol used in the wireless networks. The main purpose of those protocol was to assist the authentication process.
SSID – this is used to identification of the wireless systems. Each and every device has the SSID for its communication purpose.
VPN – this used in the wireless system for private authenticate purpose. In mobile this technique widely used.
Security threats in wireless networks
In protective threats the communication by wireless improves the areas bandwidth with the drought of money in that some of the companies are ought to require productivity with the communication (Mareco, 2018).The access which are not authorized are provided with the program code in some cases of access links and in some of the accidental areas violation is considered as one of the measurement security in the path of over writing the network (Strom, 2018). The malicious attacks is the one kind of threat and the above mentioned is known as with vulnerability and most of the time this kind of attacks are created in the industries or by the path of sharing the information from one path to another path like laptop and folders has been downloaded through the website. This type of sharing will causes the attack of malicious for breaking the network (Support, Controllers & TechNotes, 2018). VPN is the software which is used to secure the laptop computers from the malicious viruses. Adhoc is the another network which is used to secure threat and it is also the network intermittent to the computers which is mobility to the path of point which is in access and security here is lack by the networks of adhoc and it have not been in that bridge in the network. There is indirect and direct bridging in the network of bridging. In the type of direct bridging one should be configure the bridge intermitted to connectedness of two and the networks which is in personal. Bluetooth has a chance to hack while using with printers.
How to secure the wireless network
When considering the industries the networks with wireless must be secure and so it has to be deployed in that deployment with some benefits disadvantages also there and it was little tough to deploy the networks with mobility in the network areas which are wired. It should have better connectivity and productivity for the wireless user’s area. It has the advantage of bandwidth sharing and productivity. Sometimes the network has been rushed through the transmission of wireless. And the future step for the protecting the network was described by the ranges of the area which communicates and layout the easy areasfot the configuration of wireless network. For the increased area range the productivity is must for the communications with wireless. Through the point of access the communication with wireless is made on all areas. The next is planning the perfect range of usage bandwidth and perhaps the connection which is wireless is on the big areas and the bandwidth is more important for example the communication of the channel is taken by more than 50 mbps bandwidth and the bandwidth will grow higher when the access point is added. And for that access point the hardware components are require for wireless LAN communication and there is a need of adapter and if the area is not connected with wire the bridge without wire is needed for network component. And implementing the security is necessary to secure the network which is wireless from the point which is not authorized. The communications has not been presented by the network of wireless authentication and the malicious virus attacks may destroy the information. SSID is not safe in default and this is needed to broadcast to connect with access link and so SSID in offline is better way during the time of broadcasting in mobility communications. And there is another security control is created to safeguard the MAC address and it is used to separate the address of access links which is wireless. It encrypt the access link which is authenticated in the best path for strongest and it is a protocol which is encrypted end by end to make a protective communication.
Security and information protection
Wireless LAN has the restriction of accessing network point then only the authorized person can use the network. And only the person be able to secure the password by the way of confidential data. The unauthorized data’s are detected by the use of protective response to the access link. The component of hardware and software has been secured from the malicious virus attack by the mentors of access link. The data of protection are encrypted for securing the encryption. WPA2 gives the encrypted path of protection for the data productivity. The above mentioned 2 protocols are the standard protocols in the wireless productivity. There is new version of access link in WEP.
Hardware and software components
Wireless network systems consists of the some devices to create the network. And they are described below,
- Receiving devise
- NIC
- Router
- Beacons
- Antennae
Receiving device – This the client device that needs internet connectivity. That maybe a mobile or laptop.
NIC – It stands for Network Interfacing Cards. They are connected with the user’s devices that are capable of receiving the data. They use the Wi-Fi as a transmitting medium.
Routers – They are the devices used to control the network traffics. They are used to connect the user device with computers.
Beacons – they are also known as repeaters. They are used to improve the area of coverage in the wireless network.
Antennae – these are the devices used to receive and transmit the signals among the user device and the network.
Risk assessment in wireless network
Risk assessment was the method that measure all the involved risks and the impacts of the risks on the network systems (2018). When considering the wireless network connections with wired network connection it has the higher amount of security threads. Because it doesn’t have any physical security systems. So the need of risk assessment was too important. The security assessment was the only way to ensure the security of the network. Some of the available risk assessment technique was explained below.
Due to the evaluation of the new technologies in the wireless networking the effectiveness of the network system was improved. At the same time the security threads are also increases. This process was carried out to ensure the protection of the data transfers over the wireless network systems. That must prevent the network form the cybercrimes like data theft.
Risk management approaches
This process was similar to forecasting here all the risk involved in the process was identified before it actually occur. If it occurred we need to take the corrective actions. And the effect of the raised problem was completely removed. For that process we need to follow the below showed techniques.
- Avoid possible risk factors
- Reduce the impact of the risk factors
- Successful risk overcoming
In this stage we refer the previous case for know about the various risk already faced by the others. They are helps to change our strategy. Here the key risk factors are identified then it easily avoided.
Various available risk management methods:
- Integrate the whole organization plan.
- Make higher transparency.
- Take decisions by the observed risk issues.
- Continuously monitor the system
Many companies are obtaining the success through the key obtained from the risk factors. Based upon the hackers there will be variations in the risk factor. We have to provide training for the employees in order to secure the entry. The software called the malicious software hacked the money transfer system which serves as a best example. Managing the best security threads are considered by the company. The companies are considering the managing part for the security threads because by the effective managing of the security threads, the risks can be avoided easily.
Solutions
The given below are the solutions for the risk management.
- Risk factors must be understood and must learn the performance of the risk factors and how it is performed because one of the most important resource is the risk factor.
- We have to learn definitely how to reduce the risk and to avoid the risk.
- The problem solving is one of the method which is very famous for resolving or preventing the cybercrime.
- Many other organizations are also getting support from it.
- It performs many other operations like preventing the thread, priority, and identification.
Risk management keys points
The keys are used in a three kind of ways,
- By checking the internals continuously.
- By segmenting the network from the business functions and other data.
- Combinations with organization.
Continuous internal checks
The cyber criminals will attack the spots which are vulnerable at any time. The changes will get reduced by continuously monitoring the organization. So the risks can be avoided by continuously monitoring each and every step. Separate systems must be used for finding the criminals easily.
Segmentation of networks from data and other business function
If the cybercriminal wants to enter into your system, then collecting the data, images, files, and also the sensitive information’s will be his motivation and also they may try for moving the money of a business into their hands. The criminals are found out easily by separating the system.
Combination with other organizations
Cybercriminals will affect all types of organization and business. They will form a community and by using this community they will easily share or spread their information easily. We can locate the attack sources, and also we can check the attacks. Intrusions and reports by using this operations.
Threads to wireless network security
The different types of threads are given below
Rogue WLAN
This variety of thread is used for checking whether the network is wireless or not. Wireless networks are low expensive. By comparing the one thread with other thread this variety of thread is less cost. Ambitious users may done unauthorized equip in this network. These varieties are rogue thread and it is mostly used in network which are wireless. They are able to perform variety of operations, such as improperly secure or insecure and also the risks of the network has been reduced.
Spoofing internal communications
The attacks are made by outside the network or world. These are used to notify the attack which is identified once. If the attacker is joined by the WLAN the bandwidth of the network is hijacked. It is used to increase the higher bandwidth. This threads are used to perform downloads easily. These networks are used to download the documents, music files, video clips and some already running networks also.
Secure WLAN access
By using the encrypted the wireless we can able to ensure the authorization. Wireless data are encrypted by wireless network. The original method of encryption is WEP. It stands for wired with equal privacy. Fundamental flawed are found by WEP. By using WEP, one can easily generate passwords, restricted access and shared keys. There is no need of key mechanism to change the key by automatic. WEK key is cracked by the tool which is in this mechanism. WEP key can able to crack easily by using this tool. The WEP is performing better using no encryption method.
There is an insufficient enterprise network. The encryption method called WPA will be used by the next generation. Wi-fi Protect Access is the full form of WPA. The authentication server are designed by using the leverage 802.1X. Tkip uses WPA. Temporal Key Integrity Protocol is an abbreviation for TKIP. This has an ability that can change the key dynamically. For breaking the WEP encryption to prevent cracking the process called dynamic key changing has been used. Hardware and software both with wireless are used for this operation. For attending the software and hardware vendors there is website which official called 802.11. WPA technique provide the most secure and complex mechanism. An encryption algorithm known as AES is used in this technique. Wireless data can be easily protected by knowing the accessing techniques of the wireless network.
Wireless authentication
This is the process done for ensure the security of the network systems. Here the password was used to authenticate the correct node among all the available nodes. If the correct password should be matched then the usage access was given to the system. That process involves the RADIUS method. In this method all the system has a username and password to protect the data.
Network topology diagram
Here the graphic illustration of the WLAN was showed. They are called as topology diagram. That gives the overall outline of the network system. And they are showed below.
Wireless Network Implementation plan
By the aid of the Local Area Network the physical layer was linked. By using these physical layer security standard we can establish the connection between 801.11a and 801.11a. Here we can’t establish the connection between others like 802. 11c or 802. 11a. Password was different for the different layers (Matin, 2012). Also the connection among the 802.11a was not established with the 802.11b and 802.11g. So it is not possible to access the network (Kuznetsova & Repp, 2014). These connection problem was arise because of the password structure. For 801.11a has the only numerical password. But the password structure for 802.11 b has both numeric as well as text values. Here all the possible connectivity of various layers are showed.
The std configuration for 802.11a layer was SEP 99, and the 802.11b was also has the same standard as like 802.11a. Here the 802.11g has the MAY- 2003 standard. Here both 802.11a as well as 802.11g has the same raw-data speed. And the value was 54 Mbps. But the 802.11b has lower raw-data speed. And the value is 11 Mbps. This is responsible for the transfer rate. Through the investigations the speed of the 802.11a was identified as 4Mbps – 5Mbps, 802.11b has the average speed of 27Mbps and the 802.11g has 20Mbps – 25Mbps. That gives the internet speed. The frequencies for the various physical layers are 5GHz, 2.4GHz and 2.4GHz respectively. And also it has the spectrum rage of 300MHz, 83.5MHz and 83.5MHz respectively. Here the data was protected by the encryption operations. Here the different configurations are described below.
Wireless Network Security Plan
WI tuners was the tool mostly used to develop the plan for the effective wireless network system. They are used in the surveying operation of wireless LAN connection. This software is commonly used for the optimization process. This software has the capability to generate the automatic user deployment plan. Here the user can add the plan of the area. It accepts the file formats like PDF as well as JPEG. The details are feed by the .xml file. WI tuners can capable of plan the signal strength at the various locations. So this tool mostly used to implement the WLAN planning. Here we use this software for planning the WLAN connectivity for the company.
Wireless Security Policy
Wireless security policy means the setoff rules and regulations that are governed for the WLAN connection (Chilamkurti, 2013). Here the performance of the wireless network was depend on the key factors like signal strength, data rate, and propagation situations etc. ("Survey on Wireless Sensor Routing Protocols", 2015). Here the no of users was the main parameter which affects the performance of the WLAN connection. Plan for deployment of the WLAN was must consider the below showed guidelines.
- Define the No of users on the network.
- Choose the optimal locations
- Setting the parameters
- Analyze the performances of the WLAN system
Advantages of implementing the WLAN
- Higher flexible system over the wired network systems.
- Less initial cost over the wired systems.
- It has the higher degree of convenience.
- System has the capability to change dynamically.
- Higher efficiency for the business.
- Higher performance capabilities over the wired connections.
Policy generation
Security policies are governed by the network designer. While network security policy generation all the risks are considered. For making the security policy we need to follow the below showed guidelines. The actual security plan was developed for that new design was explained here.
Security plan development
This is the first stage of developing the security policy governing. Here this plan provides the requirements of the security policy. That was created based on the identified risks as well as previous problems faced by the company. It consists of the details about the when the policy created, when it implemented, how it implemented. Also we need to consider the no for users of the internet connection. While developing the security plan we must consider the required services that must need to implement on the network. For our problem we need to implement the protocols like FTP, electronic mail server, Web server’s etc. When we also need to consider the service providers as well as their rules and regulations. The developed set of policies are must satisfy the client’s needs. The security system must developed based on the needs. We must avoid the unnecessary development that doesn’t add value to the system. The authentication process was must be difficult to hack. So the quality of the authentication system was must needed. While giving the permissions to the users the confidentiality must be maintained. By hire the perfectly fitted persons to do the administrative jobs.
Security policy development
Here the security policy was developed with the guidance given by the “Site Security Handbook”. And that is described below.
Here the user access given to all the employees in the some grade. The grade includes that all deportment managers and technical body of the company. All the working mechanism are established based on our requirements. All the required persons are hired for the network maintenance. They senior manager was responsible for development of the security policy. So the manager assigned to develop the security policy of the company network systems. He is also use the knowledge of his subordinates for developing purpose. A well stuffed administrator was assigned to maintain the security of the system.
Various elements of the security plan.
- The above developed policy has the below showed elements.
- Access rights to the clients
- Responsibility of the clients
- Effective authentication technique
- Technological aspects.
Once the security plan was created we need to maintain the security plan. We need to update the security plan based on the dynamic conditions.
Conclusion
At the end of this project the detailed plan was created for the “Rare Vintage Auto Parts” was developed. That plan shows the details about the company’s wireless internet connectivity system. The connection among the head offices and stores located in the various locations as well as the warehouse was established without any flaws in the systems. The network parameters are optimized by the help of WI tuner software tool. The error in the present system was totally rectified. This process was also done by cost effectively. Now the company’s internet connectivity was upgraded. The new setoff rules and regulations are considered while developing the network system. The newly governed polices are useful for ensuring the security of the wireless network systems.
References
(2018). Retrieved from https://trade.amx.com/assets/whitePapers/AMX.Wireless.Site.Survey.Guide.pdf
Addaim, A., Kherras, A., & Guennoun, Z. (2017). Enhanced MAC protocol for designing a wireless sensor network based on a single LEO Picosatellite. International Journal of Sensor Networks, 23(3), 143. doi: 10.1504/ijsnet.2017.083399
Chilamkurti, N. (2013). Security, design, and architecture for broadband and wireless network technologies. Hershey, PA: Information Science Reference.
Ghazali, N., Baharun, S., Islam, A., & Wada, K. (2018). DESIGNING A MAINTENANCE FREE MULTI-CHANNEL WIRELESS SENSOR NETWORK PROTOCOL. Jurnal Teknologi, 80(2). doi: 10.11113/jt.v80.6298
Kuznetsova, T., & Repp, P. (2014). Theoretical aspects of designing a wireless communication network with broadband access to the main network infrastructure. Russian Electrical Engineering, 85(11), 697-702. doi: 10.3103/s106837121411008x
Levy, J. (2008). SonicWALL secure wireless network. Burlington, Mass.: Syngress.
Mao, Q., Liu, S., & Cheung, K. (2002). Network design and management. Bellingham, Wash.: Society of Photo-optical Instrumentation Engineers.
Mareco, D. (2018). 4 Different Site Surveys That Will Improve Your Wireless Network. Retrieved from https://www.securedgenetworks.com/blog/4-site-surveys-that-will-improve-your-wireless-network
Matin, M. (2012). Developments in wireless network prototyping, design, and deployment. Hershey, PA: Information Science Reference.
Strom, D. (2018). Six steps to a wireless site survey. Retrieved from https://www.computerworld.com/article/2547983/mobile-wireless/six-steps-to-a-wireless-site-survey.html
Support, P., Controllers, C., & TechNotes, T. (2018). Site Survey Guidelines for WLAN Deployment. Retrieved from https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/116057-site-survey-guidelines-wlan-00.html
Survey on Wireless Sensor Routing Protocols. (2015). International Journal Of Science And Research (IJSR), 5(5), 1145-1149. doi: 10.21275/v5i5.nov163558
Toh, C. (2018). The Wireless Network Evolution | 1 Evolution of Mobile Cellular Networks | InformIT. Retrieved from https://www.informit.com/articles/article.aspx?p=26330
Wireless Technologies Development :: Radio-Electronics.Com. (2018). Retrieved from https://www.radio-electronics.com/info/wireless/overview/wireless_dev.php
WiTuners’ Click & Tuned WLAN All-in-One Optimization. (2018). Retrieved from https://www.wituners.com/wireless-lan-optimization/wlan-optimization-solution/
Wu, Y., & Hui, J. (2004). Designing a wireless network with directional antennas: frequency division issue. Wireless Communications And Mobile Computing, 4(4), 463-471. doi: 10.1002/wcm.189.
Buy CSG 5308 Wireless Security - Free samples to Students Answers Online
Talk to our expert to get the help with CSG 5308 Wireless Security - Free samples to Students Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.