How would you review the current state and future state and provide recommendations for the network? Why would you need to set access control for the wired connections and wireless access points?

You are responsible for strengthening the controls on the network. How would you review the current state and future state and provide recommendations for the network? Why would you need to set access control for the wired connections and wireless access points?

 

Access Controls
Corporate LANs require protection to ensure confidentiality of data sent across the network, but they must
also provide access controls so that only authorized users are allowed on the network. In modern companies,
an intruder can access wired LANs from a wall jack or Ethernet wires, and wireless LANs can be accessed by
radio through an unprotected wireless access point. After gaining this access, an intruder can use a packet
sniffer to detect, intercept, and read traffic. To prevent this from happening, access controls must be utilized in
both wired (Ethernet) networks and wireless networks.
Ethernet LAN security utilizes standards such as 802.1X (port-based access control), extensible
authentication protocol (EAP), and radius servers—each of which functions in different ways and contains
different authorization, audit, and authentication features. These standards and protocols are detailed in your
Chapter 4 readings.
Wireless networks are often attacked using one of three major attack forms:
1. unauthorized access to the network;
2. an attack using an “evil twin,” which is also known as a man-in-the-middle attack; or
3. wireless DoS attacks, which are similar to the DoS attacks we discussed earlier in that their main aim
is to negatively impact the availability of a network.
These attacks prevent the host from accessing a wireless network by utilizing tactics such as flooding the
frequency with electromagnetic interference (EMI) or radio frequency interference (RFI). These tactics make
data packets unreadable due to “noise,” or disturbances in the electrical signal. Another method is to flood the
access point (AP), which would result in the AP using all of its resources to send and receive attack packets
and thereby effectively deny access to any other host. Lastly, attack commands can be sent to APs or clients
that result in a continuous stream of spoofed messages, request-to-send (RTS) frames, or clear-to-send
(CTS) frames that prevent clients from connecting to the AP.

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.