Business  >  CASE STUDY  >  C844_WLAN_Task 2.docx Alliah WLAN and Mobile Security Western Governors University C8 (All)

C844_WLAN_Task 2.docx Alliah WLAN and Mobile Security Western Governors University C8

Document Content and Description Below

C844_WLAN_Task 2.docx Alliah WLAN and Mobile Security Western Governors University C844 – Emerging Technologies in Cybersecurity Alliah is a company that has a goal to expand and grow in ... the next five years. They have a network infrastructure that is heavy on a WLAN posture shown with seven Wireless Access Points (WAPs) with little security. A security plan should be the forefront of any business when it comes to network security infrastructure, but is not mentioned to have one. The scenario mentioned that most of the funds raised were spent on site and application development and little money and time on the companys internal network. What kind of vulnerabilities exist that attackers can easily exploit from the lack of security and devotion to Alliahs security posture? With Alliah not mentioning anything of a security plan in place, little money and time has been devoted to their internal network, and there are vulnerabilities that can be easily exploited. One vulnerability would be the placement of their access points. The back patio is of concern due to the radio frequency (RF) of this access point that supports the patio area for the employees. If the RF signal is too strong, then attackers can intercept the signal with free software that can be downloaded easily on a phone, tablet or computer they have or use directional antennas that will pick up the strong RF signal. They may even be wardriving marking locations for future attacks as well as using a passive attack in just . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 3 years ago

Preview 1 out of 6 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of C844_WLAN_Task 2.docx    Alliah WLAN and Mobile Security  Western Governors University  C8 document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

60
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 31, 2022

Number of pages

6

Written in

All

Seller


Profile illustration for helperatsof1
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Jul 31, 2022

Downloads

 0

Views

 60

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, and live chat.
 FAQ
 Questions? Leave a message!


Copyright © Scholarfriends · High quality services·