.

Thursday, April 18, 2019

Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 words

Mobile and Wireless Security - Essay Exampleand Dasgupta, P., 2003).An aggressor can easily consociate to the radio lucre using wireless media and create a separate door point for provisioning of renovation to the network users. Users are forced to route traffic through the rogue access point where the assaulter can either sniff information or even alter or destroy it (Godber, A. and Dasgupta, P., 2003). The attacker can attach viruses to downloads and infect the user devices. Thus the wireless networks are required to be secured from much(prenominal) attacks.A2.Increased usage of mobile devices by the work forces in incorporated calls for implantation of security measures in wireless networks. The vulnerabilities of a wireless network are required to be overcome to prevent attacks in the form of eavesdropping, spoofing etc, resulting in loss or agree of sensitive data. Thus there exists a exigency to formulate and implement a wireless security policy to disallow unauthori zed access to the corporate networks using wireless media and allow besides approved and authenticated users to be yokeed. IPsec VPN provides an easy and robust resolve by incorporating tunneling, strong authentication and encryption procedures.The aim of the policy is to lay down standards for establishment of wireless interrelateion from remote location to the XYZ corporate intranet. The policy also gives out detailed system requirements to be in place before the remote user is actually allowed access to the corporate resources. This remote access policy is designed to prevent damage to the corporate network or computer systems and to prevent compromise or loss of data. The policy details are as under-The remote user shall connect using virtual private networking (VPN). VPN is a private network providing services to selected or authorized group. The network is virtual as it builds on public physical networks by tunneling through it (Qu, Wie and Srinivas, S., 2002). VPN service s are classified as LAN interconnect, dial-up and extranet (Venkateswaran, R., 2001). VPNs can be implemented at network or data link layer. knob CheckThe wireless network should be segregated from the intranet by employing a front-end firewall with the intranet. Firewall restricts broadcast traffic and saves STAs and APs from the intranet users.Anti-virus bundle must be installed and operational.Ensure that the client satisfies the set criteria else deny access or allow only limited access to the extent that he can access required software to meet the requirement. club Type. STAs should get connected to the corporate protected intranet through APs after IPsec VPN authentication (Weber, Chris and Bahadur, Gary, 2002) (For wireless IPsec VPN, the basic components are wireless clients or stations (STA) and a wireless access point (AP). APs act like hubs that connect to the STAs and provide pathway from wireless network to other existing network.).Authentication.IPsec authentication b etween STA and intranet should be through with(p) using Kerberos or client

No comments:

Post a Comment