Question 5: Wireless Network Survey As a consultant with the VIU Consulting Co.,
ID: 3821248 • Letter: Q
Question
Question 5: Wireless Network Survey
As a consultant with the VIU Consulting Co., you have been asked to perform a wireless access point survey at the local Software Company offices. Software Company is concerned that there may be rogue (unauthorized) Wi-Fi access points in use in their company.
Check on Internet and find at least three tools you will use to look for a rogue access points?
List at least two pros and two cons of using these tools?
Please provide me one page answer 900 words answer
Explanation / Answer
Answer: Available tools:
1)Distributed Wireless Security Auditor: IBM's Distributed Wireless Security Auditor uses authorised wireless clients as sensors to detect rogue or unauthorised APs. Distributed Wireless Security Auditor uses clients as sensors, running a Linux program that sniffs out APs and sends that information back to a database installed on a notebook or PC. The database matches sniffed APs with a list of authorized devices, pinpointing rogues or intruders.
Pros:
2) AirDefense security:
This tool is available as either a portable walk-around sniffer or a networked system. The networked system requires installation of dedicated APs around a building perimeter to constantly monitor wireless traffic. These APs report sniffing results back to a central database, which contains a list of authorized APs.
Pros:
Cons:
3) AirMagnet:
This suite of tools operating on a Pocket PC sniffs out rogue APs and intruders who use NetStumbler,a free Windows utility that can be used by drive-by snoopers to exploit unsecured APs.AirMagnet Handheld also functions as a spectrum analyzer and wireless network management tool.
Pros:
Cons:
Hope it makes sense.
Thanks
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.