logo

BN303 Wireless Network & Security Analysis

   

Added on  2020-02-24

9 Pages1822 Words67 Views
BN303Wireless Network & Security analysis at Westfield Garden City Shopping center.Use of a WLAN Tools in an enterprise setting

AbstractWireless networks have of late taken the heart of networking. They have proved to be most efficient in places where setting up cables is impossible and also in places where the span of the cables could be too large and thus incur many costs. Wireless Local Area Networks (WLANs) have the ability to support more devices than common cabled Local Area Networks (LANs). This is because those devices that can also be connected in these networks may not support the Network cables and thus may remain unconnected if the only available means is by Ethernet connections[ CITATION Jim15 \l 1033 ]. The Wireless Local Area Networks have therefore sustained more use in most places even when some workstations are connected through cables. Due to the ability to connect to the other devices and nodes without physically connecting any device, the Networks have turned to be more vulnerable to information security problems. Due to these security problems, there have been tools that have been designed to help assess the networks and prevent information leaks. Their usage was analyzed at Westfield Garden City Shopping center and this report compiled.

Use of a WLAN Tools in an enterprise settingWireless networks need no strain while setting them up. They operate using radio frequency which is within the Electromagnetic spectrum. A radio wave propagates the Radio Frequency which is supplied to anantenna that creates an electromagnetic field that propagates through space. They, therefore, prove to be cheap while setting them up. This ease in setting the network up makes it easy for a third party with a bad intention to get inside and probably damage information or access data they were not supposed to.Background analysisWireless Local Area Networks in Westfield Garden City Shopping center are subject to security threats due to several reasons. It is normally possible for hackers and crackers to keep trying access when the network is still available at their perimeter. It is therefore important to always change the Service Set Identifier (SSID) from the default and adjust the antennas to make sure the network gets to the required perimeter only.It is also possible that a user with a bad intention will use a device previously used in the network to and get the idea about the configuration of the devices in the network mostly if they used Media Access Control(MAC) address for authentication of the network[ CITATION Jos15 \l 1033 ]. It is good to authenticate devices independently using different credentials such as usernames and passwords. The Access Points should not also be placed in easily available places since an intruder can easily reconfigure the device in a way they will manage to access all the information they need.Network SniffersIt is, however, possible to keep track of the Large scale Wireless Local Area Network in Westfield Garden City Shopping center using Network sniffing tools. Having analyzed the difficulty of keeping an eye on a network and analyzing all the data that goes in and out of the network[ CITATION Kev08 \l 1033 ]. It is not sufficiently possible to secure a network or guarantee no security threats will get to a network. This is madepossible by facts such as an employee or a work, taking a business set up, may want to illegally access someinformation from a certain workstation they are not allowed. It will be easy for the person to access the Wireless Access Point and possibly alter and reconfigure the settings of the device to be able to access the information they want.Having a network sniffer will be able to overcome this. Despite the employee's knowledge of the company'sset up and time structure to avoid the physical encounter with the necessary personnel, a network sniffer will keep logs of the time they accessed the network node and probably all the information they accessed. It will, therefore, keep track of the progress of the network even when no person is physically observing.For a wireless network, network sniffers need not be so much sophisticated since they will possibly work bysniffing TCP/IP packets[CITATION Dan10 \l 1033 ]. The sniffers track the flow of data and keep records of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Paper on Wireless Networks and Antenna
|3
|1227
|368

Ethical Concerns of Wireless Technology in Global Communication Networks
|26
|8385
|265

Evaluation of Wireless Networks
|11
|4299
|214

Wireless Network Security and Preventive Techniques
|11
|2804
|321

Wireless and Mobile Communication: Advantages, Disadvantages and Recommendations
|9
|1599
|193

Information Systems Networking Essentials Assignment
|14
|2601
|29