Design and Implementation of Secure Enterprise Wireless Network Report
VerifiedAdded on 2020/05/16
|14
|3325
|195
Report
AI Summary
This report delves into the critical aspects of designing and implementing secure enterprise wireless networks. It begins by addressing the ethical implications involved, emphasizing the importance of diligence, honesty, and adherence to legal and professional standards in network design and implementation. The report outlines the essential components of a secure wireless network, including data authorization, authentication, and network integrity, while also discussing strategies for preventing network eavesdropping. It emphasizes the use of Wireless Application Protocol (WPA2) and Radius server security implementation to enhance network security. The report covers various design considerations, such as network segmentation, access credentials, and encryption keys, to protect sensitive organizational data. It highlights the need for strong passwords, authentication protocols, and adherence to international standards to maintain network integrity and prevent unauthorized access. The report concludes by summarizing key recommendations for creating a robust and secure wireless network infrastructure.

Design and implementation of secure enterprise wireless network
Name
Institution
Professor
Course
Date
Name
Institution
Professor
Course
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Contents
Introduction.................................................................................................................................................2
Ethical implications in design and implementation of secure network........................................................2
Discharging duties and responsibilities with diligence and honest..........................................................2
Performing duties within the law and in a professional manner..............................................................3
Promote acceptable network security standards and current best practices..............................................4
Uphold data confidentiality and secrecy of information encountered while on duty...............................4
Secure Wireless network design..................................................................................................................5
Data authorization...................................................................................................................................6
Authentication.........................................................................................................................................6
Network integrity....................................................................................................................................7
Network eavesdropping prevention.........................................................................................................8
Implementing secure organizational wireless network................................................................................9
Wireless Application Protocol (WPA2).................................................................................................10
Radius server security implementation..................................................................................................10
Conclusion.................................................................................................................................................11
References.................................................................................................................................................11
Introduction.................................................................................................................................................2
Ethical implications in design and implementation of secure network........................................................2
Discharging duties and responsibilities with diligence and honest..........................................................2
Performing duties within the law and in a professional manner..............................................................3
Promote acceptable network security standards and current best practices..............................................4
Uphold data confidentiality and secrecy of information encountered while on duty...............................4
Secure Wireless network design..................................................................................................................5
Data authorization...................................................................................................................................6
Authentication.........................................................................................................................................6
Network integrity....................................................................................................................................7
Network eavesdropping prevention.........................................................................................................8
Implementing secure organizational wireless network................................................................................9
Wireless Application Protocol (WPA2).................................................................................................10
Radius server security implementation..................................................................................................10
Conclusion.................................................................................................................................................11
References.................................................................................................................................................11

Introduction
Network design in various organizations have reported serious cases of security breaches
that have been emanating from network designers, organizational network security personnel,
employees of the organization, stakeholders and external entities. In regard to network security
lapses, concern has been raised on the need to come up with strategies to tame unethical
professional practices. To make network security field more professional, various ethical
practices can be followed when designing and implementing enterprise network. Such practices
would help to govern the nature of the network to be set up, control behavior of network security
guys while on duty and define required operational standards either nationally or internationally.
Ethical implications in design and implementation of secure network
All professionals are guided by ethical practices that govern how activities should be done in an
organization. Similarly, professionals in IT network design should governed by ethical practices
that hold them responsible for any activity in their line of executing duties.
Discharging duties and responsibilities with diligence and honest
Security personnel should be able to perform all duties with due diligence and highest
standards of honesty. All teams involved in network design are required to follow specific
organizational modalities of operations while executing their duties with openness. In this regard,
when network designers or organizational IT security team finds some of the proposals made by
the organization unfit to be implemented in organizational operations, they should be free to
raise their concern [11]. Such an instance helps to clear any doubt if necessary recommendations
made by various security teams were not implemented due to organizational failure. While the
security team makes their network proposals, they are to be guided by motives of securing
Network design in various organizations have reported serious cases of security breaches
that have been emanating from network designers, organizational network security personnel,
employees of the organization, stakeholders and external entities. In regard to network security
lapses, concern has been raised on the need to come up with strategies to tame unethical
professional practices. To make network security field more professional, various ethical
practices can be followed when designing and implementing enterprise network. Such practices
would help to govern the nature of the network to be set up, control behavior of network security
guys while on duty and define required operational standards either nationally or internationally.
Ethical implications in design and implementation of secure network
All professionals are guided by ethical practices that govern how activities should be done in an
organization. Similarly, professionals in IT network design should governed by ethical practices
that hold them responsible for any activity in their line of executing duties.
Discharging duties and responsibilities with diligence and honest
Security personnel should be able to perform all duties with due diligence and highest
standards of honesty. All teams involved in network design are required to follow specific
organizational modalities of operations while executing their duties with openness. In this regard,
when network designers or organizational IT security team finds some of the proposals made by
the organization unfit to be implemented in organizational operations, they should be free to
raise their concern [11]. Such an instance helps to clear any doubt if necessary recommendations
made by various security teams were not implemented due to organizational failure. While the
security team makes their network proposals, they are to be guided by motives of securing

organizational operational data. They should demonstrate why it is important, outline the actual
price to be involved and how such measures would be of great importance to the organization
[2]. All recommendations and other issues raised should be documented to make them valid and
tangible when needed. Documentation would serve as proof of genuine recommendations made
and were either implemented or rejected on some basis such unavailability of enough funds.
Performing duties within the law and in a professional manner
Network security personnel should run their activities as prescribed in the laws governing
the field and specific organizational terms of agreement. It is recommended that, network
designers propose up to date and secure network and monitor its implementation. While
designing organizational network, network designers should confine their duties with
international laws, specific state laws and organizational terms of agreements. As professionals,
IT security personnel should demonstrate highest level of professionalism coupled with
competence in service delivery [8]. Their execution of duties should prove to the client their
ability to deliver according to the terms of agreement and clients need but within strict
conformity of the law. When designing the network, IT network security team should not create
loopholes that they will come back to compromise as it has been witnessed in many
organizational cases of data breach.
Promote acceptable network security standards and current best practices
To implement up to date and strong network, some standards must be met. When
designing and implementing network security, applicable rules should be followed in order to
come up with secure network. In this case, network security team should not come up with a
network design that does not meet required operational threshold because enterprise client has
requested it. It is commonly known that, some clients would not be willing to provide required
tools and resources to set up to date network. In contrast, when network and data breach
price to be involved and how such measures would be of great importance to the organization
[2]. All recommendations and other issues raised should be documented to make them valid and
tangible when needed. Documentation would serve as proof of genuine recommendations made
and were either implemented or rejected on some basis such unavailability of enough funds.
Performing duties within the law and in a professional manner
Network security personnel should run their activities as prescribed in the laws governing
the field and specific organizational terms of agreement. It is recommended that, network
designers propose up to date and secure network and monitor its implementation. While
designing organizational network, network designers should confine their duties with
international laws, specific state laws and organizational terms of agreements. As professionals,
IT security personnel should demonstrate highest level of professionalism coupled with
competence in service delivery [8]. Their execution of duties should prove to the client their
ability to deliver according to the terms of agreement and clients need but within strict
conformity of the law. When designing the network, IT network security team should not create
loopholes that they will come back to compromise as it has been witnessed in many
organizational cases of data breach.
Promote acceptable network security standards and current best practices
To implement up to date and strong network, some standards must be met. When
designing and implementing network security, applicable rules should be followed in order to
come up with secure network. In this case, network security team should not come up with a
network design that does not meet required operational threshold because enterprise client has
requested it. It is commonly known that, some clients would not be willing to provide required
tools and resources to set up to date network. In contrast, when network and data breach
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

happens, all complaints are directed to the network designers and implementation team [13]. To
avoid unnecessary complaints, network security team should recommend network that is within
international set standards. Where clients are not willing to provide required resources to help in
setting up to date network, contract should be terminated [7]. Since organizations transact with
other organization, failing to meet required network threshold standards exposes other
organizational networks to threats.
Uphold data confidentiality and secrecy of information encountered while on duty
Network security professionals interact with organizational sensitive data that should not
be exposed to external entities. Since IT network personnel must interact with such information
while setting up organizational network, they should be should be held responsible in case such
information is lost. Due to fear of losing information to competitors, organizations and
international bodies should come up with rules that restrict IT network security teams from
exposing or using such information for personal gains [3]. When working for an organization,
they are bound by the laws of the specific organization and international rules of information
confidentiality and secrecy. IT network security team should be aware that any information
exposed to them is to help them to execute their duties diligently and honest must prevail at all
times while on duty.
Secure Wireless network design
Organizational activities have moved online due to the need to diversify its operations.
With many organizations establishing braches worldwide, communication has become quite
essential and this has necessitated the need for wireless network [15]. Important to note is that, as
much as wireless network is important, it has security issues which should be considered when
being set up in an organization. To address wireless security issues, various aspects should be
avoid unnecessary complaints, network security team should recommend network that is within
international set standards. Where clients are not willing to provide required resources to help in
setting up to date network, contract should be terminated [7]. Since organizations transact with
other organization, failing to meet required network threshold standards exposes other
organizational networks to threats.
Uphold data confidentiality and secrecy of information encountered while on duty
Network security professionals interact with organizational sensitive data that should not
be exposed to external entities. Since IT network personnel must interact with such information
while setting up organizational network, they should be should be held responsible in case such
information is lost. Due to fear of losing information to competitors, organizations and
international bodies should come up with rules that restrict IT network security teams from
exposing or using such information for personal gains [3]. When working for an organization,
they are bound by the laws of the specific organization and international rules of information
confidentiality and secrecy. IT network security team should be aware that any information
exposed to them is to help them to execute their duties diligently and honest must prevail at all
times while on duty.
Secure Wireless network design
Organizational activities have moved online due to the need to diversify its operations.
With many organizations establishing braches worldwide, communication has become quite
essential and this has necessitated the need for wireless network [15]. Important to note is that, as
much as wireless network is important, it has security issues which should be considered when
being set up in an organization. To address wireless security issues, various aspects should be

considered ranging from design of the proposed network, devices to be used in the design, the
nature of security to be implemented and number of network users in order to determine the
bandwidth [10]. All these network security aspect should be set geared towards maintaining
required network authentication, authorization, maintaining organizational data integrity and
preventing organizational data from eavesdropping while being transmitted from various
terminals to central servers.
The network would be operating in regard to various stages that are set out for
connection. First, every device within the organizational network would be required to connect
to the wireless network through Radius server authentication and its protection be strengthen
throughWPA2. Device connection to the wireless will be evaluated if it is being made from
general staff or administration network subnet. Connection terminal from general staff subnet
would not be able to view activities from administrative subnet [17]. This would be achieved
through implementation of Radius server security to subnet the network. On the other hand,
administration would be able to view activities from general staff but would have no privileges
to change any data. Device connection procedure should follow the given steps
i. Search for wireless network signal while within organization
ii. Once detected, device would get required certificate to make connections
iii. Enter login required credentials to make connections to the network
iv. Device gets connected and network system records authentication logs and encrypts
them
Data authorization
Organizational data is quite sensitive and not all users should be allowed to access such
information. A certain group of users with specific operations should be granted necessary but
nature of security to be implemented and number of network users in order to determine the
bandwidth [10]. All these network security aspect should be set geared towards maintaining
required network authentication, authorization, maintaining organizational data integrity and
preventing organizational data from eavesdropping while being transmitted from various
terminals to central servers.
The network would be operating in regard to various stages that are set out for
connection. First, every device within the organizational network would be required to connect
to the wireless network through Radius server authentication and its protection be strengthen
throughWPA2. Device connection to the wireless will be evaluated if it is being made from
general staff or administration network subnet. Connection terminal from general staff subnet
would not be able to view activities from administrative subnet [17]. This would be achieved
through implementation of Radius server security to subnet the network. On the other hand,
administration would be able to view activities from general staff but would have no privileges
to change any data. Device connection procedure should follow the given steps
i. Search for wireless network signal while within organization
ii. Once detected, device would get required certificate to make connections
iii. Enter login required credentials to make connections to the network
iv. Device gets connected and network system records authentication logs and encrypts
them
Data authorization
Organizational data is quite sensitive and not all users should be allowed to access such
information. A certain group of users with specific operations should be granted necessary but

limited operations on the data. Since most of this data is accessed online through wireless
network through dump terminals, network should be segmented in to various subnets according
to data access needs [5]. To delete or alter any data from organizational system, employees
should be granted privileges and prove authenticity of making such changes. To perform any
change o data through wireless access, network system should approve the user through use of
radius passwords before gaining access. Radius server defines extend of the network in the
organization because some of the networks might extend beyond organizational boundaries and
get used by third parties to harm organization or perform malicious activities. Similarly, once
wireless boundaries are set, access credentials is the next important that must be considered. This
is usually used to define the nature of authentication to be used. After log in credentials are
approved, connecting devices would be assigned one-time encryption key. Additionally,
Wireless Application Protocol (WPA2) should be implemented in the security purposes. It is
regarded as the modern secure means of securing organizational network due to its improved
encryption standards [1]. To access the network, user should be provided with very strong
password that provides authorization to the network.
Authentication
Wireless network should not be set free for any user due to security concerns. Both new
users and existing users should prove they are genuine users of the network any time they need
to do use it. In case of new users of the organizational network, their connection terminals must
be verified to be true user of the network [14]. To make sure network is secure, organizational
wireless network should be protected with very strong passwords and new connection terminal
must be authenticated by approved organizational network administrator. To be authenticated,
network user must agree and sign terms of agreements that abides any organizational network
user. Once authentication to the organizational network has been approved, access to the
network through dump terminals, network should be segmented in to various subnets according
to data access needs [5]. To delete or alter any data from organizational system, employees
should be granted privileges and prove authenticity of making such changes. To perform any
change o data through wireless access, network system should approve the user through use of
radius passwords before gaining access. Radius server defines extend of the network in the
organization because some of the networks might extend beyond organizational boundaries and
get used by third parties to harm organization or perform malicious activities. Similarly, once
wireless boundaries are set, access credentials is the next important that must be considered. This
is usually used to define the nature of authentication to be used. After log in credentials are
approved, connecting devices would be assigned one-time encryption key. Additionally,
Wireless Application Protocol (WPA2) should be implemented in the security purposes. It is
regarded as the modern secure means of securing organizational network due to its improved
encryption standards [1]. To access the network, user should be provided with very strong
password that provides authorization to the network.
Authentication
Wireless network should not be set free for any user due to security concerns. Both new
users and existing users should prove they are genuine users of the network any time they need
to do use it. In case of new users of the organizational network, their connection terminals must
be verified to be true user of the network [14]. To make sure network is secure, organizational
wireless network should be protected with very strong passwords and new connection terminal
must be authenticated by approved organizational network administrator. To be authenticated,
network user must agree and sign terms of agreements that abides any organizational network
user. Once authentication to the organizational network has been approved, access to the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

organizational data should be limited through assigned privileges [9]. To get this done in an
efficient and secure manner, the following aspects can be implemented. First, use of radius
server is quite appropriate measure as it provides security to the network through several aspects.
In this case, radius server provides security to organizational network through use of connection
certificates to approve the device that connects to the network. Once connecting device is
granted connection certificate, wireless access credentials are required to access the networks
and radius server authentication process ends by writing off connection logs to the network [18].
Since organizational networks are protected with secure passwords, it is important for users to be
granted essential privileges. Protection may be either logical or physical. In this case, WAP2
provides logical authentication where passwords are required in order to access organizational
network and sensitive data.
Network integrity
Wireless network should meet all required operational standards. Network operation
procedures helps in determining the quality of network to be provided and how its operations
should be maintained in line with organizational policies of operation [4]. To make sure wireless
network integrity is upheld, specific rules of operations should be set. Through of radius server,
wireless network integrity clearly defines on how to access the subject network, required
parameters and the nature of the parameter to access the network and security proofs of
connecting to the network. Therefore, if prescribed parameters and procedures are provided in
the right manner, wireless network integrity would be met and security of the network would be
guaranteed. Additionally, WPA2 protection provides rules that are to be met by organization in
order to access organizational wireless network [12]. The predefined rules are usually set by
manufacturer and it the responsibility of the network designer to select rules that specific
organization should implement.
efficient and secure manner, the following aspects can be implemented. First, use of radius
server is quite appropriate measure as it provides security to the network through several aspects.
In this case, radius server provides security to organizational network through use of connection
certificates to approve the device that connects to the network. Once connecting device is
granted connection certificate, wireless access credentials are required to access the networks
and radius server authentication process ends by writing off connection logs to the network [18].
Since organizational networks are protected with secure passwords, it is important for users to be
granted essential privileges. Protection may be either logical or physical. In this case, WAP2
provides logical authentication where passwords are required in order to access organizational
network and sensitive data.
Network integrity
Wireless network should meet all required operational standards. Network operation
procedures helps in determining the quality of network to be provided and how its operations
should be maintained in line with organizational policies of operation [4]. To make sure wireless
network integrity is upheld, specific rules of operations should be set. Through of radius server,
wireless network integrity clearly defines on how to access the subject network, required
parameters and the nature of the parameter to access the network and security proofs of
connecting to the network. Therefore, if prescribed parameters and procedures are provided in
the right manner, wireless network integrity would be met and security of the network would be
guaranteed. Additionally, WPA2 protection provides rules that are to be met by organization in
order to access organizational wireless network [12]. The predefined rules are usually set by
manufacturer and it the responsibility of the network designer to select rules that specific
organization should implement.

Network eavesdropping prevention
Network eavesdropping on wireless network takes place mainly when data is on
transmission. To prevent data eavesdropping by unauthorized users while transit, several
measures should be taken by network administrators [6]. Since almost every network user and
third party user would try to compromise and access data on transit. Through use of radius
server, security can be provided by implementing strong authentication and authorization
measures provided to help in securing organizational wireless network. By using strong
passwords and certificates provided during first time access to the network, internal user would
not be able to listen to data while within organizational network. Similarly, in cases where
organization shares wireless network with its neighboring branches, data transmission over the
network should be secured with strong keys. This makes accessed data unusable because hackers
would not have decryption key [16]. Additionally, to prevent eavesdropping, WPA2 provides
data encryption mechanisms that are not simple to bypass.
Internet Laptop
Laptop
Network eavesdropping on wireless network takes place mainly when data is on
transmission. To prevent data eavesdropping by unauthorized users while transit, several
measures should be taken by network administrators [6]. Since almost every network user and
third party user would try to compromise and access data on transit. Through use of radius
server, security can be provided by implementing strong authentication and authorization
measures provided to help in securing organizational wireless network. By using strong
passwords and certificates provided during first time access to the network, internal user would
not be able to listen to data while within organizational network. Similarly, in cases where
organization shares wireless network with its neighboring branches, data transmission over the
network should be secured with strong keys. This makes accessed data unusable because hackers
would not have decryption key [16]. Additionally, to prevent eavesdropping, WPA2 provides
data encryption mechanisms that are not simple to bypass.
Internet Laptop
Laptop

Implementing secure organizational wireless network
It is the desire of every organization to operate on a safe environment that is free of
attacker. Having implemented wireless network in organizations, network security is of
paramount and should be enforced through various measures. In this case, network security has
been implemented through use of Radius server and Wireless Application protocol (WPA2) [15].
Wireless Application Protocol (WPA2)
WPA2 is considered to be one of the modern secure networks in current technology world.
Implementing it on the organizational operations, it would guarantee security of network. The
following steps would be used in setting up wireless network through use of WPA2.
i. Before setting up of the wireless, it would be recommended to create a database of
network users
It is the desire of every organization to operate on a safe environment that is free of
attacker. Having implemented wireless network in organizations, network security is of
paramount and should be enforced through various measures. In this case, network security has
been implemented through use of Radius server and Wireless Application protocol (WPA2) [15].
Wireless Application Protocol (WPA2)
WPA2 is considered to be one of the modern secure networks in current technology world.
Implementing it on the organizational operations, it would guarantee security of network. The
following steps would be used in setting up wireless network through use of WPA2.
i. Before setting up of the wireless, it would be recommended to create a database of
network users
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

ii. The database can be set up in the same machine or a different one through use of MSQL
or MariaDB.
iii. Choose and set up network encryption keys to be used in securing the network
iv. Create relevant client connections of who might be using the network
v. Client connects to the network by providing required details as the network server saves
for future use
vi. Once connected, network router would be set up to provide required business integrity
rules
vii. Limit connection rules to enhance business integrity of the wireless network
viii. Before sending data, it should be encrypted to make sure it is free from interruption
Radius server security implementation
i. Create database to capture users of the network
ii. Grant operational certificates to users of the network
iii. Provide required permissions to relevant network users of the network
iv. Access the network for organizational business activities
v. Record one time log and encrypt it with secure protection key
vi. Each tie user requires access to the network, should be prompted to enter login
credentials to ascertain the authenticity of the user
Conclusion
When designing and implementing organizational network, security should be given
highest priority. Designing and implementing network should be guided by ethical principles
as well as adhere to international standards. Some of the principles that should guide
or MariaDB.
iii. Choose and set up network encryption keys to be used in securing the network
iv. Create relevant client connections of who might be using the network
v. Client connects to the network by providing required details as the network server saves
for future use
vi. Once connected, network router would be set up to provide required business integrity
rules
vii. Limit connection rules to enhance business integrity of the wireless network
viii. Before sending data, it should be encrypted to make sure it is free from interruption
Radius server security implementation
i. Create database to capture users of the network
ii. Grant operational certificates to users of the network
iii. Provide required permissions to relevant network users of the network
iv. Access the network for organizational business activities
v. Record one time log and encrypt it with secure protection key
vi. Each tie user requires access to the network, should be prompted to enter login
credentials to ascertain the authenticity of the user
Conclusion
When designing and implementing organizational network, security should be given
highest priority. Designing and implementing network should be guided by ethical principles
as well as adhere to international standards. Some of the principles that should guide

international network designers are; execution of duties diligently and in an honest manner.
Similarly, network designers should provide required network recommendations and be
guided by principle of designing current and up to date network. Finally, network security
teams should uphold confidentiality and secrecy of information as required by law. During
design and implementation of secure wireless network, principles of integrity, authentication,
authorization and prevention of data loss through eavesdropping should be met. As all
network design principles are implemented, there actualization should put in to practices both
Wireless Application protocols (WPA2) and Radius server.
References
1. Bicakci, K., & Tavli, B. (2009). Denial-of-Service attacks and countermeasures
in IEEE 802.11 wireless networks. Computer Standards & Interfaces, 31(5), 931-
941.
2. Cardenas, A. A., Roosta, T., & Sastry, S. (2009). Rethinking security properties,
threat models, and the design space in sensor networks: A case study in SCADA
systems. Ad Hoc Networks, 7(8), 1434-1447.
3. Chen, Z., Liu, A., Li, Z., Choi, Y. J., Sekiya, H., & Li, J. (2017). Energy-efficient
broadcasting scheme for smart industrial wireless sensor networks. Mobile
Information Systems, 2017.
4. Chilamkurti, N. (2013). Security, design, and architecture for broadband and
wireless network technologies. Hershey, PA: Information Science Reference.
5. Das, S. K., Kant, K., & Zhang, N. (2012). Handbook on securing cyber-physical
critical infrastructure: Foundation and challenges. Waltham, MA: Morgan
Kaufmann.
Similarly, network designers should provide required network recommendations and be
guided by principle of designing current and up to date network. Finally, network security
teams should uphold confidentiality and secrecy of information as required by law. During
design and implementation of secure wireless network, principles of integrity, authentication,
authorization and prevention of data loss through eavesdropping should be met. As all
network design principles are implemented, there actualization should put in to practices both
Wireless Application protocols (WPA2) and Radius server.
References
1. Bicakci, K., & Tavli, B. (2009). Denial-of-Service attacks and countermeasures
in IEEE 802.11 wireless networks. Computer Standards & Interfaces, 31(5), 931-
941.
2. Cardenas, A. A., Roosta, T., & Sastry, S. (2009). Rethinking security properties,
threat models, and the design space in sensor networks: A case study in SCADA
systems. Ad Hoc Networks, 7(8), 1434-1447.
3. Chen, Z., Liu, A., Li, Z., Choi, Y. J., Sekiya, H., & Li, J. (2017). Energy-efficient
broadcasting scheme for smart industrial wireless sensor networks. Mobile
Information Systems, 2017.
4. Chilamkurti, N. (2013). Security, design, and architecture for broadband and
wireless network technologies. Hershey, PA: Information Science Reference.
5. Das, S. K., Kant, K., & Zhang, N. (2012). Handbook on securing cyber-physical
critical infrastructure: Foundation and challenges. Waltham, MA: Morgan
Kaufmann.

6. Doherty, J. (2016). Wireless and mobile device security. Burlington, MA: Jones
& Bartlett Learning.
7. Fadyushin, V., & Popov, A. (2016). Building a pentesting lab for wireless
networks: Build your own secure enterprise or home penetration testing lab to dig
into the various hacking techniques.
8. Geier, J. T., & Geier, J. T. (2015). Designing and deploying 802.11 wireless
networks: A practical guide to implementing 802.11n and 802.11ac wireless
networks for enterprise-based applications.
9. Holt, A., & Huang, C.-Y. (2010). 802.11 wireless networks: Security and
analysis. London: Springer.
10. Hossain, E., Chow, G., Leung, V. C., McLeod, R. D., Mišić, J., Wong, V. W., &
Yang, O. (2010). Vehicular telematics over heterogeneous wireless networks: A
survey. Computer Communications, 33(7), 775-793.
11. Levy, J. (2008). SonicWALL secure wireless network: Integrated solutions
guide. Burlington, Mass: Syngress.
12. Li, S., Xu, L. D., & Romdhani, I. (2017). Securing the internet of things.
13. Lloret, J., Bosch, I., Sendra, S., & Serrano, A. (2011). A wireless sensor network
for vineyard monitoring that uses image processing. Sensors, 11(6), 6165-6196.
14. Ramachandran, V., & Buchanan, C. (2015). Kali Linux wireless penetration
testing: Master wireless testing techniques to survey and attack wireless networks
with Kali Linux.
& Bartlett Learning.
7. Fadyushin, V., & Popov, A. (2016). Building a pentesting lab for wireless
networks: Build your own secure enterprise or home penetration testing lab to dig
into the various hacking techniques.
8. Geier, J. T., & Geier, J. T. (2015). Designing and deploying 802.11 wireless
networks: A practical guide to implementing 802.11n and 802.11ac wireless
networks for enterprise-based applications.
9. Holt, A., & Huang, C.-Y. (2010). 802.11 wireless networks: Security and
analysis. London: Springer.
10. Hossain, E., Chow, G., Leung, V. C., McLeod, R. D., Mišić, J., Wong, V. W., &
Yang, O. (2010). Vehicular telematics over heterogeneous wireless networks: A
survey. Computer Communications, 33(7), 775-793.
11. Levy, J. (2008). SonicWALL secure wireless network: Integrated solutions
guide. Burlington, Mass: Syngress.
12. Li, S., Xu, L. D., & Romdhani, I. (2017). Securing the internet of things.
13. Lloret, J., Bosch, I., Sendra, S., & Serrano, A. (2011). A wireless sensor network
for vineyard monitoring that uses image processing. Sensors, 11(6), 6165-6196.
14. Ramachandran, V., & Buchanan, C. (2015). Kali Linux wireless penetration
testing: Master wireless testing techniques to survey and attack wireless networks
with Kali Linux.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

15. Raths, D. (2012). Are you ready for BYOD: Advice from the trenches on how to
prepare your wireless network for the Bring-Your-Own-Device movement? THE
Journal (Technological Horizons in Education), 39(4), 28.
16. Usman, A., & Shami, S. H. (2013). Evolution of communication technologies for
smart grid applications. Renewable and Sustainable Energy Reviews, 19, 191-
199.
17. Ventrone, J., & Hollis, A. (2016). From the Air Force to college: Transitioning
from the service to higher education.
18. Wrightson, T. (2012). Wireless network security: A beginner's guide. New York:
McGraw-Hill.
prepare your wireless network for the Bring-Your-Own-Device movement? THE
Journal (Technological Horizons in Education), 39(4), 28.
16. Usman, A., & Shami, S. H. (2013). Evolution of communication technologies for
smart grid applications. Renewable and Sustainable Energy Reviews, 19, 191-
199.
17. Ventrone, J., & Hollis, A. (2016). From the Air Force to college: Transitioning
from the service to higher education.
18. Wrightson, T. (2012). Wireless network security: A beginner's guide. New York:
McGraw-Hill.
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.