WEP Network Design: Security, Implementation, and Analysis Report

Verified

Added on  2022/10/11

|12
|509
|16
Report
AI Summary
This report delves into the intricacies of WEP network design, emphasizing security and implementation strategies. It begins by highlighting the increasing popularity of wireless networks, and the need for secure designs. The report addresses the requirements for wireless networks, specifically focusing on the needs of Camp David and the US president. It then explores various security vulnerabilities, including eavesdropping, message manipulation, and denial-of-service attacks. To combat these threats, the report proposes a robust security architecture, including the use of EAP-MD5, CHAP protocol, and transport layer security. Furthermore, it recommends the implementation of stateful firewalls and software solutions such as remote hub server programming bundles and multiport serial boards to enhance network security and performance. Finally, the report includes a list of references.
Document Page
WEP Network Design
Name of the Student
Course Title
Date:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Increased number of internet users has made wireless networking
very popular, and has seen the development of many wireless
networking protocols that are based on different spectrum.
WEP offers impenetrable resistance to eavesdroppers/hackers and has
grown in popularity as wireless networking becomes use increases.
At the center of the problem at hand is WEP design in all aspects in a
network operation centre: analysis and planning, implementation that
meet security requirements.
This points to the implementation to a framework that is not related
to physical connections.
Different implementation technologies must be considered in line
with clients’ needs
Document Page
Secured Wireless network
infrastructure
Document Page
Reasons for Wireless Network
Increased workforce mobility and collaboration. Employees can work more effectively,
roam around the park without losing connectivity.
Increased performance and productivity fueled by ease of info sharing and customer
service.
Easier network access and expansion. Network can be cost-effectively expanded to meet
future needs.
Security can easily be implemented within all districts in the location. Increased response
and guest access is also needed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Wi-Fi Users
The network will be used by Camp David and the US president retreat employees
Wireless technologies are increasingly becoming popular. Most organizations are
deploying them.
President request for WEP wireless network to support dignitaries in their work.
Document Page
Network Usage
Document Page
Environment
While thre are many encryption options usable with wireless networks
between the wireless router and users, and that which are designed
to ensure privacy and information secrecy, it requires that the same
setting be used for all network clients.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security and Protection
Security vulnerabilities include
Eavesdropping
Message manipulation and bogus messaging
Impersonation is easy
Previously recorded messages can easily be replayed
Unauthorized access to network and network services.
Denial of Service attacks
IP poisoning, and spoofing.
Document Page
Design for Security Architecture
Wireless networks are prone to attacks just like any other information system.
EAP-MD5 CHAP protocol could be a good security design
Transport layer security for both servers and clients.
Cryptographic message integrity can be used defeat forgeries in the network
Firewall application- both stateful and desktop based
Document Page
Recommendations
For security purposes and reliable servers, this implementation needs software
solutions that supply effective and adequate servers. such include remote hub
server programming bundle.
Multiport serial board together with hub product to produce more serial port
connections to server machine.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Vulnerability Testing
Document Page
References
Barken, L. (2004). How Secure is Your Wireless Network?: Safeguarding Your Wi-Fi LAN. Prentice
Hall Professional.
Eady, F. (2005). Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded
Systems Designers. Newnes.
Harwood, M. (2011). CompTIA Network+ N10-004 Exam Cram. Pearson Education India
Mark Dowd, J. M. (2006). The Art of Software Security Assessment: Identifying and Preventing
Software Vulnerabilities. Pearson Education
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]