Develop a strategy to handle the wireless security within the organization. In t
ID: 3595818 • Letter: D
Question
Develop a strategy to handle the wireless security within the organization. In this assignment, analyze and describe the following:
Threats and Vulnerabilities
Your Plan to Mitigate these Threats and Vulnerabilities
How you will implement WLAN in your organization physically and logically
What will be the restrictions you place on your WLAN use?
What is your plan to sustain a secure WLAN?
Your submission should be thoughtful and at least 5 pages double spaced and in outline form with descriptions for each lower level item.
Explanation / Answer
Your Plan to Mitigate these Threats and Vulnerabilities
- In order to Mitigate these Threats and Vulnerabilities we must know the organization policies and we must understand how to review, write, assess, and support security policy and procedures.
- we must know and understand the security treat which has occured recent times.
- we must know How policy protects people, organizations, and information in the company
- we must know the Relationship of mission statement to policy
- we must know the Policy versus procedure.
- we must know the Policy needs assessment.
- we must know the Governing policy
- we must know the Issue-specific policy
- We must do all the Policy review and assessment process
How you will implement WLAN in your organization physically and logically
For implementing the WLAN in our organization physically and logically we need to follow few things to fullfill the needs for WLAN such as
- we must always verify the Business Needs in order to develop the new technology or in order to implement the WLAN in it.
- We must need the area to implement the technology or any service in future and we need to determine our Coverage Area.
- Always make sure that we always plan the Bandwidth Utilization of every devices in our company or organisation.
- We must make a note how much amount of Hardware Requirements are needed to implement the WLAN or any technology in our company.
- We must survey all the needs and requirments and take a example of other site Survey
- Afer finishing all the hardware requirments and survey we need to implement better Security in our company.
- After the security implementation we need to take a training session and we must deliver that trainnig to others and Deploy them.
What will be the restrictions you place on your WLAN use?
- We must restrict the media access control addressing which is also know as MAC.
- We must enable the WEP encryption for not scrambling the data.
- We must make sure that all the traditional VPN are in our control and all the Virtual Private Network securities are in our control.
- We must make sure that all the systems are in domain because it is very easy to control all the systems which are inclueded in domain.
- We must make sure that no other wireless connectivity can established in our WLAN network.
What is your plan to sustain a secure WLAN?
- In order to sustain a secure WLAN we must retail the store loses credit card numbers over Wireless LAN
- In order to sustain a secure WLAN we must secure the all the hands on Exercise and we must do all the passively monitoring on a Wireless LAN.
- In order to sustain a secure WLAN we must enable all the Unauthorized Access.
- In order to sustain a secure WLAN we must make sure that there wont be any denial of Service Attacks.
- In order to sustain a secure WLAN we must do the minimal amount of security precautions.
- In order to sustain a secure WLAN we must secure the security steps with some regulations which can make our network safer.
- In order to sustain a secure WLAN we must follow the Organizations rules and we must monitor their network for changes to configurations.
- In order to sustain a secure WLAN we must ensure the changes are approved and compliant with the policy maintained.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.