logo

Wireless Security for Rare Vintage Auto Parts Ltd

Assess and report on resolution strategies for Rare Vintage Auto Parts Ltd's wireless deployment, including risk identification and analysis, selection of countermeasures, hardware and software deployment, development of policies/guidelines, and presentation.

19 Pages5679 Words416 Views
   

Added on  2023-06-11

About This Document

This report addresses the network security concerns of Rare Vintage Auto Parts Ltd. It discusses the issues responsible for the disabled communication within the company’s infrastructure and ways to make the network security and communication system efficient using a software and hardware infrastructural design complimented by a Bring Your Own Device Policy.

Wireless Security for Rare Vintage Auto Parts Ltd

Assess and report on resolution strategies for Rare Vintage Auto Parts Ltd's wireless deployment, including risk identification and analysis, selection of countermeasures, hardware and software deployment, development of policies/guidelines, and presentation.

   Added on 2023-06-11

ShareRelated Documents
WIRELESS SECURITY
NAME
COURSE
AFFILIATION
Wireless Security for Rare Vintage Auto Parts Ltd_1
Abstract.
Rare vintage auto parts limited supplies spare parts to the automotive industry. This
systematic review paper addresses the network security concerns of the firm. The paper seeks
to address the issues in the network’s wireless system, network links, till system and the
hardware or software that enables deployment and communication of data transfer
mechanisms in the different cities located in different areas of the city. The report addresses
the issues responsible for the disabled communication within the company’s infrastructure in
the following categories; poor encryption system, broadcasting the company’s SSID,
unprotected network without a firewall and Virtual Private Network, mixed data cards and
operations without policies, principles and guidelines to the employees regarding the
network. Additionally, this article discusses the ways and mechanisms in which the network
security and communication system will be made efficient using a software and hardware
infrastructural design complimented by a Bring Your Own Device Policy.
Wireless Security for Rare Vintage Auto Parts Ltd_2
Table of Contents
Abstract................................................................................................................................................2
Introduction.........................................................................................................................................3
Methodology........................................................................................................................................3
Findings................................................................................................................................................4
1. Broadcasting the company network SSID..................................................................................4
2. Wireless network is configured to personal mode:....................................................................5
3. Weak wireless network encryption.............................................................................................5
4. Antennas used to not match.......................................................................................................5
5. High power gain access points..................................................................................................6
6. The network is not protected by a firewall or Virtual Private Network(VPN)...........................7
7. The broadcast domain is not configured to enable network sub-setting....................................8
8. Network lacks a designated router and back up router..............................................................9
9. The network was deployed using mixed network cards with different standards.......................9
10. The company has no data backup mechanism and recovery system....................................10
11. Rare Vintage Auto Parts Ltd has not provided its management and employees a network
security policy and guidelines..........................................................................................................10
Deployment Of Appropriate Software And Hardware...................................................................11
1. Rare Vintage Auto Parts Ltd should purchase and deploy Cisco Unified Threat Management
Systems............................................................................................................................................11
2. Microsoft azure cloud computing services...............................................................................11
Bring Your Own Device Policy.........................................................................................................12
Privacy expectation...........................................................................................................................12
Acceptable use....................................................................................................................................12
User acknowledgement and agreement............................................................................................15
Wireless Security for Rare Vintage Auto Parts Ltd_3
Introduction.
Rare vintage auto spares limited company raised concerns by the management and
owner to address network related limitations to full functioning capabilities of the company.
The network issues raised included failure to provide a smooth communication between the
company offices situated at different locations in the city leading to numerous data losses,
failed purchases and deliveries and reduced revenues due to a drop in normal business
activities. The issues peaked with the dismissal of the network’s IT administrator who was
described as rude and would access illicit content via the network system. The network failed
and was not serviceable after the dismissal with replacement of a non-expert in the IT
administrator docket, Miller et al (2012).
This report addresses therefore, the identified and analysed risks generated from the
network vulnerability to external malicious individuals. The network threats and
vulnerabilities derived from the poor networking security practices in the company have been
assessed using the risk matrix and mitigations documented. In this report, the following will
therefore be addressed circumstantially using the risk assessment matrix: poor data
encryption mechanism, antenna types with a very high power gains and mixed network data
cards, Thomson, G. (2012).
Methodology.
Data collection was conducted to collect data and analyse the network security system
and provide solutions to the identified risks. The following methods were applied:
In-depth interviews: 27 employees participated in the data collection process. From a
random sample, the participants were asked to provide their feelings, opinions and knowledge
about the company’s network system in terms of access, usage, coverage, strength, speed and
security, Song, Y. (2014).
Network security testing: a thorough static, dynamic and live testing procedures were
conducted on the network to determine the vulnerabilities in the code and running mode and
a vulnerability report was generated, Gollakota, S., & Katabi, D. (2011, April).
Secondary sources of data: the files in the storage facility of the company including
deployment files, tender files and employee files were analysed for data the network system,
usage, privileges and authenticity, Zou et al (2016).
Wireless Security for Rare Vintage Auto Parts Ltd_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Bring Your Own Device Policy - PDF
|17
|5025
|77

Wireless Security: Issues and Solutions for Rare Vintage Auto Parts Ltd
|21
|5735
|409

Implementing a Secure Wireless System in an Enterprise Environment
|30
|5527
|498

Secure Wireless Design for Rare Vintage Auto Parts Ltd
|12
|4782
|97

Rare vintage Auto Parts Ltd Assignment PDF
|21
|5842
|24

Technology Implementation of Security Controls Assignment
|24
|6349
|50