Nobody downloaded yet

Rogue Access Point Network Security - Term Paper Example

Comments (0) Cite this document
Summary
In the daily operations of organizations, firms are exposed to various vulnerabilities, particularly as a result of the engagement of activities through a network. In most occasions, firms have been known to use wide area and local area networks for communication purposes…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Rogue Access Point Network Security Paper
Read TextPreview

Extract of sample "Rogue Access Point Network Security"

Download file to see previous pages This implies that it is essential to determine the vulnerabilities that are associated with an organization’s control system networks through the seeking of understanding into operations and communication types that could be concomitant to the system. In this study, the main concern was the understanding of ways by which organizations network securities can be exposed to any form of network dangers, and the assessment of the security requirements and approach needed to fully comprehend and address the weaknesses of the network system’s access points.
Consequently, the completion of this project is aimed at enabling the student to gain relevant practical knowledge on the aspects of network security requirements of an organization that are needed to harden the access points and prevent known network vulnerabilities. This shall be done with the core point of reference being the rogue access points (APs).
A rogue access point refers to a wireless access point mounted on a safe network without explicitly receiving authorization form the administrator of the local network. In another sense, the rogue access points may be created by hackers in the process of trying to gain access to the system’s components through the conduct of man-in-the-middle attacks. Rogue access points, whether wireless or otherwise have often posed great security threats to an organization. Considering that if the rogue access points are of the first kind, then the organization will be deemed to lose in the sense that due to its large employee capacity, anyone with a right of entry to the premises would have the capacity to maliciously or non-maliciously install inexpensive wireless routers that could be used to potentially allow for the access of secure networks of the organization to unauthorized locations/parties.
If the rogue access point is of a second kind, then the target would be the organization’s network that don’t engage the client-server and server-client relationship ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Rogue Access Point Network Security Paper Term Example | Topics and Well Written Essays - 2500 words”, n.d.)
Rogue Access Point Network Security Paper Term Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/information-technology/1671057-rogue-access-point-network-security-paper
(Rogue Access Point Network Security Paper Term Example | Topics and Well Written Essays - 2500 Words)
Rogue Access Point Network Security Paper Term Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1671057-rogue-access-point-network-security-paper.
“Rogue Access Point Network Security Paper Term Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1671057-rogue-access-point-network-security-paper.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Rogue Access Point Network Security Paper

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

.... FortiAP is a protected project group WLAN policy and it has the power to work in combination with FortiGate that is a multi-threat safety application. Additionally, it is acting like the useful access-point controller to offer a particular networking environment which merges wireless networking technology through incorporated network security (JazTech; Mukherjee). Considering the network security issues Juniper network stated the OEM conformities with Dell Inc to provide networking technological solutions with the name of Dell's PowerConnect. And through International Business Machine (IBM) to re-vend Juniper's Ethernet networking solutions also offers capabilities for data-center clients of IBM business. As well, they joined... concern...
13 Pages(3250 words)Research Paper

Network Security

...also encrypts and decrypts user messages before sending to its intended recipient. This way, the security level is further enhanced, and chances of an interception reduced. The BES uses TCP/IP to access the wireless network. It also provides handhelds with TCP/IP connectivity accessed through Mobile Data System (MDS) (BlackBerry 2009) BlackBerry Security BlackBerry devices and their popularity in government offices have put the security of the BlackBerry network services under heavy scrutiny. This is so especially considering the risk that will be created when sensitive documents land in the wrong hands. The safety of...
7 Pages(1750 words)Essay

Wireless Security Policy

...of responsibility for all employees in how they conduct their use of the infrastructure. Each user must exercise due diligence in protecting the network and avoid abuse. A culture of employees being responsible custodians of equipment under their care will be developed. Terms and Definitions Rogue: These are devices on the network that the administrator may not be aware of, but compromises the security of the system. Station: Also known as devices, they are the media through which users use the information on the network and they include computers and mobile phones WAP: Wireless Access Point, which acts as a hub through...
5 Pages(1250 words)Assignment

Network Security

...). In addition to a firewall, VPNs should be used within the company. A VPN is a means of securely accessing the network within an unsecured environment. It achieves this by employing authentication, encryption, and tunneling - otherwise known as encapsulation. VPNs can be implemented within the company in the following two ways: eliminating the need for leased lines which boosts security and cuts costs, and provides a secure environment when remotely accessing the network externally. By consistently using VPNs and securing the network with firewalls, the odds of intrusive attacks and...
3 Pages(750 words)Case Study

Network Remote Access

...specified logic built into the broker device. The network device that comes into picture for compulsory tunneling is some times called FEP (front end processors), Network access servers (NAS) or point of presence (POS). The basic function of compulsory tunneling is to hide the details of server connectivity from the VPN client and then moves it's control from client to local carrier. The additional burden for the service provider is the he has to install and maintain the front-end processors. There are number VPN tunneling protocols available, which are presently implemented in various VPN applications. The most widely used are. 1....
5 Pages(1250 words)Essay

Detecting rogue access point using Omnipeek software to analyze the wireless network

...Wireless Network Security Detecting rogue access point using Omnipeek software to analyze the wireless network College: Date: Wireless Network Security Table of contents Wireless Network Security 1 Detecting rogue access point using Omnipeek software to analyze the wireless network 1 Table of contents 2 Chapter 2 3 Literature review 3 2.0 Overview of network security systems 3 2.1 Overview of IEEE 802.11 standard 6 2.1.1 The 802.11a...
21 Pages(5250 words)Essay

Network security

...with the operating systems. The HCL may be centrally controlled and user driven. An official HCL should be available on the website of the operating system. The Linux operating system provides the best HCLs (http://www.linuxquestions.org/hcl). Microsoft windows provide the HCL access to average users also due to their market dominance (http://www.microsoft.com/whdc/hcl/) Service packs update However network security policies aim at the protection of network and related accessible resources from unauthorized users. The administrators ensure the continuous monitoring and effective implementation of the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Network Security Paper

...security (Codenomicon, 2014). This loophole allows stealing of secured information and data under normal settings, by the SSL/TLS encryption used to protect the Internet. The SSL/TLS covers privacy and communication security for applications found in the Internet such as the web, instant messaging (IM), email and virtual private networks (VPNs). The Heartbleed bug permits any user accessing the Internet to read the systems’ memory secured by the weaker versions of the OpenSSL applications. This jeopardizes the secret keys used to pinpoint the service providers and to encode the movement, the names and passwords of the users and the...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Rogue Access Point Network Security Paper for FREE!

Contact Us