Question

In this activity, you search the Internet to find examples of devices that physically secure wireless...

In this activity, you search the Internet to find examples of devices that physically secure wireless components. Select a device and write a summary of it.

  1. Start your Web browser, and perform an Internet search for wireless physical security devices.

  2. Visit several sites, and examine at least three different devices.

  3. Select one device and write a two- to a three-paragraph summary of it. Include details such as the device’s cost, its purpose, how it works, and where to get it. Be sure to cite your sources.

  4. Proofread your paper, and submit it to your instructor.

In this project, you research products that can help you implement company security policies for wireless handheld devices.

Review the list of best practices from the “Best Practices for Wireless Network Security” section earlier in this chapter.

Select three of the best practices, and then search online for products that you can use to implement these practices. Identify three different products that can enforce one best practice each.

Write a report that lists the three best practices you chose and the products that enforce these practices. Describe the advantages and disadvantages of each solution.

Submit the report to your instructor, and be prepared to discuss your findings in class.

The following list summarizes other best practices to follow:

Use strong authentication, such as 802.1x.

Use strong encryption, preferably end to end.

Perform a site survey and place APs strategically.

Make sure that a comprehensive wireless security policy is kept up to date, and that users are trained to follow it.

Change default settings, such as SSIDs.

Avoid using protocols that send traffic in cleartext.

If appropriate, use VPNs for wireless transmissions.

Use wireless IDPSs.

Make sure that all stations use updated antivirus protection.

Make sure that wireless devices use firewalls.

Audit the wireless network periodically.

Monitor your wireless network traffic with the best tools available.

Homework Answers

Answer #1

New Oberon's spline wireless access point enclosure

This provides Physical Security and Wireless Signal Transparency, enclosures simplify network deployments state Oberon's new Model 1041-00 wireless LAN access point mount is a 12 inch by 12 inch (305 mm by 305 mm) concealed spline (or concealed tee) ceiling tile designed specifically secure the Cisco series 1140, 1260, 3500, and 3600 wireless access points. This access point installs into the ceiling runners like a standard concealed spline tile. The access point is securely flush to the ceiling, making for an aesthetic installation and providing ideal, unobstructed wireless coverage.

The Model 1041-00 provides the physical security network designers require. In addition to thorough compatibility testing enclosures for a wide array of wireless equipment, Oberon has designed enclosures to simplify the rigorous infection control procedures of the healthcare sector and provide the physical security vital to government, education, retail, and banking environments. Oberon manufactures enclosures and mounting solutions for wireless LAN access points. A wide variety of models are available for mounting equipment in both suspended and hard-lid ceilings, on walls, and in outdoor/NEMA environments. Telecommunications enclosures for networking components are also offered for both office and home environments. Enclosures provide security through locking doors, convenience of access to simplify maintenance, and a sleek, aesthetic appearance.

Oberon's wireless enclosures and antenna products are used where the RF coverage, infrastructure security, environmental robustness, and aesthetics are paramount in the network design and implementation.

"https://news.thomasnet.com/fullstory/wireless-access-point-enclosure-provides-physical-security-609640"

"http://www.oberonwireless.com/"

Best practices

1.Turn off the wireless network when not necessary

In a business that is 24×7 this is obviously not an option. Shuting down is the only measure that makes an attack impossible. Additionally if you can shut down any computers, do this, as well. Shutting down individual devices will limit the computers’ exposure to risk as well. By shutting down every wireless device possible, you reduce the devices’ chances of taking a power hit, such as a surge or dip that could compromise the operations of the device or its critical data.

2.Change the default IP address and credentials on your Wireless products

If you continue to use the default IP subnet and IP address for a wireless device, you will be making hackers’ jobs easier. Change the IP subnetwork whenever possible. Always change the default IP addresses of your wireless access points and routers. Most wireless devices come pre-set with a default username and password, which one uses to connect to and install your devices. This makes interaction easy but also makes it easy for others to guess credentials. Make sure both the username and password are changed. A good password should be at least 20 characters long and include numbers, letters, and various symbols. One way to do this is to change them at a regular interval in case they are compromised. Disadvantageous when we can't cope with complexity of managing number of passwords.

3. Disable Remote Access aka Remote Administration

Most wireless devices allow one to access its user interface from a directly connected device (via a cable that facilitates serial communication). However, many products allow access from remote systems as well. Disabling Remote Access or Remote Administration will make it much more difficult for an unauthorized user to gain access. When this functionality is necessary, filter by allowing certain IP blocks to specific IP addresses and open only the exact protocols used for communications.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Hands-On Project 14-4 Research a Wireless LAN Suppose you have a DSL connection to the Internet...
Hands-On Project 14-4 Research a Wireless LAN Suppose you have a DSL connection to the Internet in your home and you want to connect two laptops and a desktop computer in a wireless network to the Internet. You need to purchase a multifunction wireless router like the one you learned to configure in this chapter. You also need a wireless adapter for the desktop computer. (The two laptops have built-in wireless networking.) Use the web to research the equipment needed...
what is your opinion on this? Should companies use wireless technology for their networks? I think...
what is your opinion on this? Should companies use wireless technology for their networks? I think it depends on the size of the company. For a small business, I think it would be better to use a wireless network because it is more flexible and there’s not a concern about distance limitations due to the small number of employees so it would be easier to control network traffic. For a large company, I think wired networks would be better to...
Case You own a small computer business and you specialize in setting up networks for small...
Case You own a small computer business and you specialize in setting up networks for small businesses. The owner of a local sporting goods store has hired you to set up a local area network for his business. He wants to connect computers located in an office, on the selling floor, in a series of rooms in which he offers personal training classes, in a section of the store with batting cages, and in the section of the store that...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging data and information to perform specific task without the need of human assistance. M2M technology can be of two types: wired and wireless. Mostly, 2G and 3G networks are more popular. They usually use public network like cellular and Ethernet to keep the cost is a low range. The main function of M2M technology is to access data from sensors and transmit it to...
Do an internet search for an article about recent market activity that demonstrates how the interaction...
Do an internet search for an article about recent market activity that demonstrates how the interaction of supply and demand have affected the market price and quantity of a good or service. Specifically, and this is what you will be graded on: 1. Linked below is a file titled “How to Analyze Supply and Demand Problems” and contains 11 steps to analyze a supply and demand problem. 2. Walk through the 11 steps in analyzing your article scenario.   3. Also,...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
In JAVA Find the code for sorts in your language some where online. You will copy...
In JAVA Find the code for sorts in your language some where online. You will copy code from the internet (with citation!) and modify it to test. Make a random array of integers, then perform each search on them. LINEAR SEARCH Write a linear search method to find a number in the list. Call this before each of your sort methods. Include a comment explaining how Linear Search works, when to use it, when you cannot. BINARY SEARCH Write a...
Hello! I would like to ask you idea of writing in business! Thank you so much!...
Hello! I would like to ask you idea of writing in business! Thank you so much! Prompt on the below. Creating Inter-Office Email. Inter-Office Email Setting: You are the Communications Coordinator for CVS.  CVS is currently assessing its communication practices with its 200 vendors using an online survey.  CVS and its stores are spread all throughout the United States of America. Instructions: You have been tasked with persuading the vendors to complete the survey.  It is not a mandatory survey, so you must...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT