Wireless Network Auditing: Techniques, Risks, Tools, and Security

Verified

Added on  2023/03/30

|6
|1022
|480
Report
AI Summary
This report investigates wireless network auditing techniques, highlighting the necessity of special attention due to vulnerabilities absent in traditional wired networks. It identifies inherent risks such as bandwidth stealing, criminal activity, and evil twins, and outlines objectives for auditing wireless networks, including compliance, issue recognition, and risk mitigation. Various auditing tools like MetaGeek InSSIder, NETSCOUT AirMagnet, and Xirrus Inspector are discussed. The report argues the advantages and disadvantages of wireless networking, focusing on mobility, cost-effectiveness, and adaptability versus limited bandwidth and security risks. It also concentrates on corporate enterprise environments, including the use of anti-malware software and secure mobile communication, and scrutinizes the GAWN certification and its place in the industry. The report concludes that GAWN certification helps in mitigating cyber security-related issues.
Document Page
Running head: - WIRELESS NETWORK
WIRELESS NETWORK
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1WIRELESS NETWORK
Investigate and clarify why wireless networks deserve special attention when it comes to
the auditing techniques you will use.
Special attention is needed to be provided in the field of wireless auditing technique
as there are several vulnerabilities present in the systems which are configured differently to
the traditional wired networks. Chances of the system getting attacked by the malicious
entities also increases the importance of the auditing technology will be used. Information
transmission is also one of the major aspect that auditing techniques will be implemented in
the process. Keeping a check of over the DoS attack is also another reason special attention is
needed to be provided regarding the implementation of auditing technique in wireless
networks (Luong et al, 2017). Disruption of network management controls due to presence of
interlopes have been another reason of paying specific attention to the auditing techniques in
wireless networks.
Identify the additional risks inherent with a wireless networking environment
The major risks that are inherited by the wireless network system includes Bandwidth
stealing, Criminal activity, Masquerade, Litigation Risks, Reputation losing, Financial risks,
Evil twins is considered as an important additional risk that is present in wireless network.
Risks related to information sensitivity is also performed as per the processing of wireless
network
Discuss the objectives for auditing wireless techniques
Objective 1: Objectives of performing auditing wireless technique includes carrying out
proper and relevant compliance activities. Fast establishing of company’s internal policies is
also considered as a major objective.
Objective 2: The penultimate objective includes recognizing of issues that are present in the
functional process.
Document Page
2WIRELESS NETWORK
Objective 3: The ultimate objective of implementing auditing processes is to mitigate the
issues that are present in the functioning process of wireless network.
Select several of the tools available for wireless auditing procedures
The tools that can be used for performing the wireless auditing process are as follows:
-
MetaGeek InSSIder: MetaGeek InSSIder is a wireless connection troubleshooting tool
that will be implementing SSIDs and channel information for proper assessment of
locating the rogue Aps
NETSCOUT AirMagnet: NETSCOUT AirMagnet uses wireless network mapping
and information projection that will be providing automatic detection of the security
threats and hence tracking the vulnerabilities in the wireless network (Cai et al, 2015).
Xirrus Inspector: Xirrus Inspector is a free application that enhances the management
of the processing of the verification and coverage of the data security threats and
detects unauthenticated access. Real time graphical interface has been one of the
major aspect that increases the efficiency of the entire application.
Argue both the advantages and disadvantages of wireless networking
The main advantage of implementing wireless network are as follows: -
Mobility: Mobility of wireless network will be very high. The main aspect that the
presence of wired services are absent and hence relocating with the system has been
highly beneficial (Lu et al. 2015).
Cost effectiveness: It is detected that the cost that is incurred in the processing of
wired network has been much higher. Hence it can be stated that the cost that is
Document Page
3WIRELESS NETWORK
incurred in execution of the same project with the help of the wireless network would
have been comparatively low than the wired networks (Zhang et al, 2015).
Adaptability: Setting up and dissembling versatile situations have been very high.
Hence wireless network will be providing boost to the signal set.
The main disadvantages present are as follows: -
Bandwidth provided is limited
Security related risks are also present in the implementation of wireless network
Jamming and interference also has been a major disadvantage
Concentrating on the corporate enterprise environment regarding wireless hardware and
mobile devices
Corporate enterprise environment in case of wireless hardware and mobile devices
includes usage of antimalware software. Securing mobile communication has also been
processing proper management and hence VPN related issues will be present (Biswas et al,
2015). This section ensures that presence of strong authentication with the usage of password
control can be performed. Controlling third party software has been another corporate
enterprise environment that are needed to be concentrated.
Scrutinize the GAWN (GIAC Assessing and Auditing Wireless Networks) certification and
its place in the industry.
The areas that are covered by the GAWN includes 802.11 Fuzzing attacks. Encrypting
the attacks is also a covered aspect. Sections of Bluetooth attacks along with the low energy
attacks will also be benefitting the usage of GAWN. GAWN finds its usage in the working
process of the Auditors, ethical hackers, network security staff, technical auditors and
wireless system engineers (Andrews et al, 2016).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4WIRELESS NETWORK
After getting certification helps in mitigating the processing of Bridging of the Air
Gap, high frequency RFID attacks and that of practical SDR attacks. Hence this leads to the
fact that the GAWN certification has been benefitting the functioning process cyber security
related issues.
Document Page
5WIRELESS NETWORK
References
Andrews, J. G., Zhang, X., Durgin, G. D., & Gupta, A. K. (2016). Are we approaching the
fundamental limits of wireless network densification?. IEEE Communications
Magazine, 54(10), 184-190.
Biswas, S., Bicket, J., Wong, E., Musaloiu-e, R., Bhartia, A., & Aguayo, D. (2015, August).
Large-scale measurements of wireless network behavior. In ACM SIGCOMM
Computer Communication Review (Vol. 45, No. 4, pp. 153-165). ACM.
Cai, Y., Yu, F. R., Liang, C., Sun, B., & Yan, Q. (2015). Software-defined device-to-device
(D2D) communications in virtual wireless networks with imperfect network state
information (NSI). IEEE Transactions on Vehicular Technology, 65(9), 7349-7360.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2015). Wireless charging technologies:
Fundamentals, standards, and network applications. IEEE Communications Surveys
& Tutorials, 18(2), 1413-1452. Lu
Luong, N. C., Hoang, D. T., Wang, P., Niyato, D., & Han, Z. (2017). Applications of
economic and pricing models for wireless network security: A survey. IEEE
Communications Surveys & Tutorials, 19(4), 2735-2767.
Zhang, N., Yang, P., Zhang, S., Chen, D., Zhuang, W., Liang, B., & Shen, X. S. (2017).
Software defined networking enabled wireless network virtualization: Challenges and
solutions. IEEE Network, 31(5), 42-49.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]