logo

Network Security and Design

   

Added on  2022-11-22

17 Pages3129 Words395 Views
 | 
 | 
 | 
Running head: NETWORK SECURITY AND DESIGN
Network Security and Design
Name of the Student
Name of the University
Author Note
Network Security and Design_1

NETWORK SECURITY AND DESIGN
1
Summary
Secure enterprise wireless networks have gained significant grounds in connecting devices of
networks for both home and corporate uses. The report talks about the security and
authentication mechanisms for such networks. First the report summarises the requirements
for securing the typical wireless networks where it identifies the network requirements, the
kind of wireless network to be implemented, the security mechanisms to be configured on the
network, and the technologies and standards that the security systems should adhere by. The
report then discusses the ethical issues related to wireless networks and highlights how lack
of data protection, privacy, information theft and manipulation can affect users. Then the
report provides the network design diagram of organizations in general and explains the
network design and how the security mechanisms can be applied. Next the report makes a
thorough analysis of the security schemes and identifies their strength over the competition.
Then the report briefly describes how the security techniques can be applied on the network.
After that the report tests the connections of clients with the access points and ends with
conclusion notes.
Network Security and Design_2

NETWORK SECURITY AND DESIGN
2
Table of Contents
Introduction................................................................................................................................4
Discussion..................................................................................................................................4
Requirements..........................................................................................................................4
Ethical Implications...............................................................................................................5
Network Design.....................................................................................................................7
WPA2 Analysis......................................................................................................................8
Confidentiality....................................................................................................................8
Integrity..............................................................................................................................8
Availability.........................................................................................................................8
Authentication....................................................................................................................9
Authorization......................................................................................................................9
RADIUS Analysis..................................................................................................................9
Confidentiality....................................................................................................................9
Integrity..............................................................................................................................9
Availability.........................................................................................................................9
Authentication..................................................................................................................10
Authorization....................................................................................................................10
Implementation of WPA2 and RADIUS..............................................................................10
Testing Connection of Clients..............................................................................................11
Conclusion................................................................................................................................12
Bibliography.............................................................................................................................14
Network Security and Design_3

NETWORK SECURITY AND DESIGN
3
Network Security and Design_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Design and Implementation of Secure Enterprise Wireless Network
|9
|3003
|441

Wireless Network Security Analysis
|9
|1108
|143

Smart Campus Network Simulation
|10
|2278
|148

BYOD Security Risk Analysis
|20
|4618
|386

Technology Implementation of Security Controls
|2
|687
|278

Wireless Network Security Analysis
|14
|3325
|195