Ttm4137 : Network Security In Assessment Answer

1). Network security is an important consideration in wireless communication as the transmission is unguided. An intruder may easily use an antenna to detect the signals and decode the messages if proper security measures are not in place. You should perform a literature survey on modern wireless security strategies and challenges and identify the pros and cons of these strategies. 

Answer:

Network Security is an important consideration for wireless communication and maintaining the security of wireless communication network. Network data security is in wireless communication is high priority mainly because the transmission medium is unguided, which makes it easier for the hackers to extract information from the medium [6]. The use of wireless networking in the organization is increasing and therefore it becomes essential for the organizations to ensure proper protection of the wireless network. This is because, network security provides, protection of access, misuse and hacking of the files stored in the computer network system while its wireless transfer. An intruder can easily target a wireless communication   by making use of an antenna to detect the signals and decode the messages that is being transferred through the wireless medium.The importance of network security therefore lies in the intention and need of safeguarding the private and the confidential information that is being transferred through a wireless medium.

Therefore, the network security in an organization remains the biggest concerns of setting up and making use of a wireless connectio


n in a network. There are a number of factors behind the increase in threats associated with the use of a wireless medium. One of the leading factors is that the use of air waves as a communicating medium makes it accessible to public. This access makes the wireless communication process vulnerable to attacks from the hackers. There are a number of ways by which an intruder can target and launch an attack on the wireless communicating medium. These includes, gaining an access to the rogue access points, weak security of the network and the denial of service attacks. The denial of service attack is however less harmful as with this attack, the hackers can only prevent the legitimate users from accessing the network but cannot fetch any data from the network. Use of a rogue access point can be described as access of the network by a person who is not authorized to access it. This can be done by setting up a false access point with an intention to eavesdrop the communication in the network. This therefore is dangerous as the confidential information that is communicated through a particular network can be easily accessed by the intruder. Therefore it is essential to ensure that the companies adopt various security strategies that can possibly help the organization in facing and eliminating the issues associated with the use of wireless network for communication .This paper will evaluate the different security strategies that a company might undertake in order to ensure that the communication channel is not compromised. There are certain basic strategies that can be undertaken by the organization. One of the basic security strategies that an organization can undertake is encryption. Encryption is one of most important security strategies that a company should undertake in order to ensure secure communication through a wireless network. The encryption in the wireless network can be done through WPA2 networking protocol as it allows only an authorized member to access the network. This network security protocol (WPA2) governs one of the most basic and certain necessary security elements such as user IDs, passwords and IP management. Without the use of proper encryption, the security of the wireless network of an organization can be compromised.

Apart from encryption, it is necessary to safeguard the associated networking devices such as routers and modems with strong password so that gaining an access to the network becomes difficult. The passwords should however be difficult to guess so that any intruder fails to get easy access to such devices associated with a wireless network.  The next strategy that can be used by the organizations in order to ensure proper network security in wireless is preventing any guest access to the network. Providing an access to guest networking often turns out to be vulnerable for a network and therefore it is necessary for an organization to turn off any guest browsing. Another important strategy to ensure data security protection to the network is to update the firmware in regular interval so that the network devices are installed with up to date network security protocols .

This will make it difficult for the hackers to access the network or get access to the network communication. Ensuring wireless security strategies mainly include two fundamental approaches which include, acknowledging and isolating the network from the rest of the network so that it becomes less vulnerable to attacks Alternatively, the wireless network can be made secure by enforcing proper encryption and authentication control in the network so that any unauthorized member fails to have an access to a particular wireless network, which in turn ensures proper security in the network. The first approach mainly focuses on segregation so that even one part of the network gets hacked the other networks of the organization remains safe .

However, one of the major concerns associated with this approach is that it does not provide actual protection to the wireless network but only ensure that the wired part of the network remains safe from the attack. The second approach provides an appropriate security and protection to the information that is exchanged through the wireless network of an organization. Wi-Fi protected access can also be considered in this case as one of the most useful strategies for ensuring security in a wireless network. WPA makes use of temporal key integrity protocol to ensure proper protection of the wireless network. The physical layer attacks on the wireless communication network include jamming and eavesdropping while that in network layer includes IP spoofing, IP hijacking and smurf attack. The attacks the wireless network might face in transport layer include TCP flooding, UDP flooding and CP sequence prediction attack.

Therefore it becomes mandatory to ensure proper security in wireless network. The strategies that are proposed provide a good solution for proper network security. However, it becomes essential to evaluate the advantages and disadvantages of each of the strategies that has been proposed for the wireless network in order to ensure whether the strategies proposed will actually work or not. Encryption and authentication can ensure protection against the unauthorized access to the wireless network but may not provide adequate protection against the malware attack, SQL injection, cross site scripting and FTP bounce. Another disadvantage of encryption is that it becomes quite expensive and often becomes overburden to the IT staff. Preventing any rogue access point is another strategy that can be employed by the organizations in order to ensure that any unauthorized access to the network is prevented.  It is essential for the organization to plan proper strategies to ensure protection of the wireless network. Network security mainly consists of policies and practices for proper monitoring and ensuring secure use of wireless network. The research study evaluates the strategy that will ensure protection of the network and the communication in the wireless network. One of the strategies that can be implemented for ensuring proper protection in the wireless network is making use of virtual private network .

This is because the use of VPN ensures a proper secure channel of communication so that the confidential information can be easily communicated through the medium. A VPN channel is established by making use of software on both the ends of tunnel and this tunnel helps in proper encryption and decryption of the data stream. The VPN can be used within the internal network of the organization mainly on the firewall and the other security server of the data center. The VPN coupled with encryption and authentication helps in secure data access across the organization. The intruders are not able to get an access to the information that is shared through a virtual private network. Therefore, the use of virtual private network is one of the most significant strategies that ensure proper security of wireless communication [7]. Ensuring security in a wireless network is essential as transmission of the data through this medium unguided and therefore is very much vulnerable to any attacks. Apart from VPN, encryption is another strategy that can be adopted by an organization for ensuring proper access. However, the weaknesses associated with the WEP encryption technique should be addressed and for that WPA2 encryption technique is recommended for the organization. The research study aims at evaluating the advantages as well and the disadvantages associated with the proposed strategies.

References:

[1]. Zou, Y., Zhu, J., Wang, X., & Leung, V. C. (2015). Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29(1), 42-48.

[2]. Khan, F. (2014, October). Secure communication and routing architecture in wireless sensor networks. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on(pp. 647-650). IEEE.

[3]. Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), 859-868.

[4]. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.

[5]. Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2014). Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), 1224-1227.

[6]. Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks–a survey. Computer Communications, 51, 1-20.

[7]. Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.

 



Buy Ttm4137 : Network Security In Assessment Answers Online

Talk to our expert to get the help with Ttm4137 : Network Security In Assessment Answers from Assignment Hippo Experts to complete your assessment on time and boost your grades now

The main aim/motive of the finance assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignment help Australia. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at www.assignmenthippo.com are so much skilled, capable, talented, and experienced in their field and use our best and free Citation Generator and cite your writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for Ttm4137 : Network Security In Assessment Answer Assignment Help Online

Want to order fresh copy of the Sample Ttm4137 : Network Security In Assessment Answers? online or do you need the old solutions for Sample Ttm4137 : Network Security In Assessment Answer, contact our customer support or talk to us to get the answers of it.

Assignment Help Australia
Want latest solution of this assignment

Want to order fresh copy of the Ttm4137 : Network Security In Assessment Answers? online or do you need the old solutions for Sample Ttm4137 : Network Security In Assessment Answer, contact our customer support or talk to us to get the answers of it.