Question

what is your opinion on this? Should companies use wireless technology for their networks? I think...

what is your opinion on this?


Should companies use wireless technology for their networks?

I think it depends on the size of the company. For a small business, I think it would be better to use a wireless network because it is more flexible and there’s not a concern about distance limitations due to the small number of employees so it would be easier to control network traffic. For a large company, I think wired networks would be better to use because it provides more security and access control. A large company would mean more resources required and IT specialists to maintain and monitor wired network activity.

What limits should be placed upon the use of wireless technology?
The limitations that should be placed are the number of users for each wireless access point, the security configurations, who will be authorized to access the network, and what devices are authorized to be used on the network.


What "best practices" should be deployed for wireless installations?
Best practices should include devices maintaining the required security software installed to maintain network security configurations, conducting periodic updates and patches; and performing all applications and software testing before being used on the wireless networks.


What safeguards should be implemented to protect both wireless and wired resources?

The safeguards that should be used are monitoring tools to conduct network security and vulnerability monitoring to protect both wireless and wired resources. Typically, Wireless networks are more of a security risk due to both wireless and wired attacks.

Homework Answers

Answer #1

1). I agree with that.

Because wired network maintenance is high. For a small company, it is expensive. In case of large company, using wired netwok can avoid most of the security problems also.

2). Yes, Correct.

Security of wireless network is very low. Because, wireless network can access with in a range of the signal. So attackers can easily steel the data. Speed of the wireless network is also low compared to wired network.

3). And also, should not forget to avoid placing access points near structural metal and avoid overlapping DHCP scopes.

4). Safeguarding wireless network by avoiding default password, use stronger encryption , hide network name from public, use firewall and VPN.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging...
Machine to Machine (M2M) is a direct network technology mostly used between networked devices for exchanging data and information to perform specific task without the need of human assistance. M2M technology can be of two types: wired and wireless. Mostly, 2G and 3G networks are more popular. They usually use public network like cellular and Ethernet to keep the cost is a low range. The main function of M2M technology is to access data from sensors and transmit it to...
Case You own a small computer business and you specialize in setting up networks for small...
Case You own a small computer business and you specialize in setting up networks for small businesses. The owner of a local sporting goods store has hired you to set up a local area network for his business. He wants to connect computers located in an office, on the selling floor, in a series of rooms in which he offers personal training classes, in a section of the store with batting cages, and in the section of the store that...
Cohension Case- The Broadway Café. Network, Telecommunication & Wireless Computing: Telecommunication systems enable the transmission of...
Cohension Case- The Broadway Café. Network, Telecommunication & Wireless Computing: Telecommunication systems enable the transmission of data over public or private networks. A network is a communications, data exchange, and resource sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. Telecommunication systems and networks are traditionally complicated and historically inefficient. However, businesses can benefit from today’s modern network infrastructures that provide reliable global reach to employees and customers. Businesses...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6...
Why use APA standard for documenting? What is plagiarizing? When formulating a security report, what 6 questions should be asked? What is meant by the term “chain of custody”? When can it be said that something is in “your custody”? What are the three steps for chain of custody procedures when dealing with data? When should you prepare for an incident? What are the 5 steps for quick incident handling? When is a good time to test an incident plan?...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from outside of the office. Employees and employers both benefit from the flexibility and efficiency that arises when workers can perform their duties from coffee shops, airports, their homes, and more. As such, providing employees with the ability to work remotely is an excellent way to attract and retain a talented, productive team. The devices and security measures used throughout an organization play a significant...
Provide a summary of the article below (200-400 words) that includes/addresses the following: Why you selected...
Provide a summary of the article below (200-400 words) that includes/addresses the following: Why you selected this article. Describe at least two things you learned from the article including how they add to your knowledge of Global Information Technology. 5G vs. 4G Cellular Technology: What Businesses Need to Know 5G networks are rolling out worldwide. Verizon, AT&T, Comcast, T-Mobile, and Sprint are among the leading 5G internet service providers. Mobile and fixed 5G services are still limited in geographic reach,...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...