Question

In this activity, you search the Internet to find examples of devices that physically secure wireless...

In this activity, you search the Internet to find examples of devices that physically secure wireless components. Select a device and write a summary of it.

  1. Start your Web browser, and perform an Internet search for wireless physical security devices.

  2. Visit several sites, and examine at least three different devices.

  3. Select one device and write a two- to a three-paragraph summary of it. Include details such as the device’s cost, its purpose, how it works, and where to get it. Be sure to cite your sources.

  4. Proofread your paper, and submit it to your instructor.

In this project, you research products that can help you implement company security policies for wireless handheld devices.

Review the list of best practices from the “Best Practices for Wireless Network Security” section earlier in this chapter.

Select three of the best practices, and then search online for products that you can use to implement these practices. Identify three different products that can enforce one best practice each.

Write a report that lists the three best practices you chose and the products that enforce these practices. Describe the advantages and disadvantages of each solution.

Submit the report to your instructor, and be prepared to discuss your findings in class.

The following list summarizes other best practices to follow:

Use strong authentication, such as 802.1x.

Use strong encryption, preferably end to end.

Perform a site survey and place APs strategically.

Make sure that a comprehensive wireless security policy is kept up to date, and that users are trained to follow it.

Change default settings, such as SSIDs.

Avoid using protocols that send traffic in cleartext.

If appropriate, use VPNs for wireless transmissions.

Use wireless IDPSs.

Make sure that all stations use updated antivirus protection.

Make sure that wireless devices use firewalls.

Audit the wireless network periodically.

Monitor your wireless network traffic with the best tools available.

Homework Answers

Answer #1

New Oberon's spline wireless access point enclosure

This provides Physical Security and Wireless Signal Transparency, enclosures simplify network deployments state Oberon's new Model 1041-00 wireless LAN access point mount is a 12 inch by 12 inch (305 mm by 305 mm) concealed spline (or concealed tee) ceiling tile designed specifically secure the Cisco series 1140, 1260, 3500, and 3600 wireless access points. This access point installs into the ceiling runners like a standard concealed spline tile. The access point is securely flush to the ceiling, making for an aesthetic installation and providing ideal, unobstructed wireless coverage.

The Model 1041-00 provides the physical security network designers require. In addition to thorough compatibility testing enclosures for a wide array of wireless equipment, Oberon has designed enclosures to simplify the rigorous infection control procedures of the healthcare sector and provide the physical security vital to government, education, retail, and banking environments. Oberon manufactures enclosures and mounting solutions for wireless LAN access points. A wide variety of models are available for mounting equipment in both suspended and hard-lid ceilings, on walls, and in outdoor/NEMA environments. Telecommunications enclosures for networking components are also offered for both office and home environments. Enclosures provide security through locking doors, convenience of access to simplify maintenance, and a sleek, aesthetic appearance.

Oberon's wireless enclosures and antenna products are used where the RF coverage, infrastructure security, environmental robustness, and aesthetics are paramount in the network design and implementation.

"https://news.thomasnet.com/fullstory/wireless-access-point-enclosure-provides-physical-security-609640"

"http://www.oberonwireless.com/"

Best practices

1.Turn off the wireless network when not necessary

In a business that is 24×7 this is obviously not an option. Shuting down is the only measure that makes an attack impossible. Additionally if you can shut down any computers, do this, as well. Shutting down individual devices will limit the computers’ exposure to risk as well. By shutting down every wireless device possible, you reduce the devices’ chances of taking a power hit, such as a surge or dip that could compromise the operations of the device or its critical data.

2.Change the default IP address and credentials on your Wireless products

If you continue to use the default IP subnet and IP address for a wireless device, you will be making hackers’ jobs easier. Change the IP subnetwork whenever possible. Always change the default IP addresses of your wireless access points and routers. Most wireless devices come pre-set with a default username and password, which one uses to connect to and install your devices. This makes interaction easy but also makes it easy for others to guess credentials. Make sure both the username and password are changed. A good password should be at least 20 characters long and include numbers, letters, and various symbols. One way to do this is to change them at a regular interval in case they are compromised. Disadvantageous when we can't cope with complexity of managing number of passwords.

3. Disable Remote Access aka Remote Administration

Most wireless devices allow one to access its user interface from a directly connected device (via a cable that facilitates serial communication). However, many products allow access from remote systems as well. Disabling Remote Access or Remote Administration will make it much more difficult for an unauthorized user to gain access. When this functionality is necessary, filter by allowing certain IP blocks to specific IP addresses and open only the exact protocols used for communications.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
what is your opinion on this? Should companies use wireless technology for their networks? I think...
what is your opinion on this? Should companies use wireless technology for their networks? I think it depends on the size of the company. For a small business, I think it would be better to use a wireless network because it is more flexible and there’s not a concern about distance limitations due to the small number of employees so it would be easier to control network traffic. For a large company, I think wired networks would be better to...
Case You own a small computer business and you specialize in setting up networks for small...
Case You own a small computer business and you specialize in setting up networks for small businesses. The owner of a local sporting goods store has hired you to set up a local area network for his business. He wants to connect computers located in an office, on the selling floor, in a series of rooms in which he offers personal training classes, in a section of the store with batting cages, and in the section of the store that...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging data and information to perform specific task without the need of human assistance. M2M technology can be of two types: wired and wireless. Mostly, 2G and 3G networks are more popular. They usually use public network like cellular and Ethernet to keep the cost is a low range. The main function of M2M technology is to access data from sensors and transmit it to...
Do an internet search for an article about recent market activity that demonstrates how the interaction...
Do an internet search for an article about recent market activity that demonstrates how the interaction of supply and demand have affected the market price and quantity of a good or service. Specifically, and this is what you will be graded on: 1. Linked below is a file titled “How to Analyze Supply and Demand Problems” and contains 11 steps to analyze a supply and demand problem. 2. Walk through the 11 steps in analyzing your article scenario.   3. Also,...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
In JAVA Find the code for sorts in your language some where online. You will copy...
In JAVA Find the code for sorts in your language some where online. You will copy code from the internet (with citation!) and modify it to test. Make a random array of integers, then perform each search on them. LINEAR SEARCH Write a linear search method to find a number in the list. Call this before each of your sort methods. Include a comment explaining how Linear Search works, when to use it, when you cannot. BINARY SEARCH Write a...
Hello! I would like to ask you idea of writing in business! Thank you so much!...
Hello! I would like to ask you idea of writing in business! Thank you so much! Prompt on the below. Creating Inter-Office Email. Inter-Office Email Setting: You are the Communications Coordinator for CVS.  CVS is currently assessing its communication practices with its 200 vendors using an online survey.  CVS and its stores are spread all throughout the United States of America. Instructions: You have been tasked with persuading the vendors to complete the survey.  It is not a mandatory survey, so you must...
Cooperative Education--Discussion Question #1--Spring, 2018 COLLAPSE SPECIAL NOTE: You will have two weeks, instead of one,...
Cooperative Education--Discussion Question #1--Spring, 2018 COLLAPSE SPECIAL NOTE: You will have two weeks, instead of one, to complete this particular discussion question. This discussion question assignment can earn you 105 huge points, depending on the quality and timeliness of your comments and how well you follow the instructions for this assignment. Within the two weeks time period you should answer my specific discussion question (all parts of it) AND also respond to at least two other students’ comments. This will...
One of the American Marketing Association's definitions of marketing says it's "a set of processes for...
One of the American Marketing Association's definitions of marketing says it's "a set of processes for creating, communicating, and delivering value to customers." When consumers calculate the value of a product, they look at the benefits and then subtract the price to see whether the benefits exceed the costs, including the cost of driving to the store or shipping fees if they buy the product online. Whether consumers perceive a product as the best value depends on many factors, including...