logo

Wireless Network Security Analysis

   

Added on  2020-05-16

14 Pages3325 Words195 Views
 | 
 | 
 | 
Design and implementation of secure enterprise wireless networkNameInstitutionProfessorCourseDate
Wireless Network Security Analysis_1

ContentsIntroduction.................................................................................................................................................2Ethical implications in design and implementation of secure network........................................................2Discharging duties and responsibilities with diligence and honest..........................................................2Performing duties within the law and in a professional manner..............................................................3Promote acceptable network security standards and current best practices..............................................4Uphold data confidentiality and secrecy of information encountered while on duty...............................4Secure Wireless network design..................................................................................................................5Data authorization...................................................................................................................................6Authentication.........................................................................................................................................6Network integrity....................................................................................................................................7Network eavesdropping prevention.........................................................................................................8Implementing secure organizational wireless network................................................................................9Wireless Application Protocol (WPA2).................................................................................................10Radius server security implementation..................................................................................................10Conclusion.................................................................................................................................................11References.................................................................................................................................................11
Wireless Network Security Analysis_2

IntroductionNetwork design in various organizations have reported serious cases of security breachesthat have been emanating from network designers, organizational network security personnel,employees of the organization, stakeholders and external entities. In regard to network securitylapses, concern has been raised on the need to come up with strategies to tame unethicalprofessional practices. To make network security field more professional, various ethicalpractices can be followed when designing and implementing enterprise network. Such practiceswould help to govern the nature of the network to be set up, control behavior of network securityguys while on duty and define required operational standards either nationally or internationally.Ethical implications in design and implementation of secure networkAll professionals are guided by ethical practices that govern how activities should be done in an organization. Similarly, professionals in IT network design should governed by ethical practices that hold them responsible for any activity in their line of executing duties. Discharging duties and responsibilities with diligence and honestSecurity personnel should be able to perform all duties with due diligence and higheststandards of honesty. All teams involved in network design are required to follow specificorganizational modalities of operations while executing their duties with openness. In this regard,when network designers or organizational IT security team finds some of the proposals made bythe organization unfit to be implemented in organizational operations, they should be free toraise their concern [11]. Such an instance helps to clear any doubt if necessary recommendationsmade by various security teams were not implemented due to organizational failure. While thesecurity team makes their network proposals, they are to be guided by motives of securing
Wireless Network Security Analysis_3

organizational operational data. They should demonstrate why it is important, outline the actualprice to be involved and how such measures would be of great importance to the organization[2]. All recommendations and other issues raised should be documented to make them valid andtangible when needed. Documentation would serve as proof of genuine recommendations madeand were either implemented or rejected on some basis such unavailability of enough funds.Performing duties within the law and in a professional mannerNetwork security personnel should run their activities as prescribed in the laws governingthe field and specific organizational terms of agreement. It is recommended that, networkdesigners propose up to date and secure network and monitor its implementation. Whiledesigning organizational network, network designers should confine their duties withinternational laws, specific state laws and organizational terms of agreements. As professionals,IT security personnel should demonstrate highest level of professionalism coupled withcompetence in service delivery [8]. Their execution of duties should prove to the client theirability to deliver according to the terms of agreement and clients need but within strictconformity of the law. When designing the network, IT network security team should not createloopholes that they will come back to compromise as it has been witnessed in manyorganizational cases of data breach. Promote acceptable network security standards and current best practicesTo implement up to date and strong network, some standards must be met. Whendesigning and implementing network security, applicable rules should be followed in order tocome up with secure network. In this case, network security team should not come up with anetwork design that does not meet required operational threshold because enterprise client hasrequested it. It is commonly known that, some clients would not be willing to provide requiredtools and resources to set up to date network. In contrast, when network and data breach
Wireless Network Security Analysis_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Individual assignment on Boeing Company 2022
|4
|726
|22

Legal Ethics and Integrity | Report
|3
|446
|31

Ethical Dilemmas in Business: A Case Study
|5
|743
|98

Ethical Considerations in Whistleblowing
|16
|3638
|382

Network Administration Procedures and Processes
|8
|657
|378

Legal and Ethical Compliance
|6
|1856
|67