Information Technology > Study Notes > Company Network Infrastructure Vulnerabilities (All)

Company Network Infrastructure Vulnerabilities

Document Content and Description Below

Alliah Company Network Infrastructure Vulnerabilities C844: Emerging Technologies in Cybersecurity TGMT -05:00 Table of Contents A. WLAN vulnerabilities on the Alliah network..................... ....................................................................3 B. Mobile vulnerabilities..........................................................................................................................4 C. Mitigation and remediation of Alliah WLAN/mobile vulnerabilities...................................................5 D. Small business security measures........................................................................................................6 E. Bring your own device (BYOD) security............................................................................................7 F. References...........................................................................................................................................8 A. WLAN vulnerabilities on the Alliah network According to the scenario presented that describes the Alliah Company WLAN environment, there are multiple elements that can be considered weaknesses in the strength of Alliah’s network. Alliah’s headquarters is in a large three-story converted warehouse with a large back patio area for employees and a vacant third floor ready for expansion. Both areas are serviced by the company Wi-Fi via access points placed around the facility. Access points (AP’s) are dummy devices that are centrally administered by a wireless LAN controller and mindlessly transmit network connection information such as the network name (SSID), the encryption type (if any), and the strength of the signal. Leaving a large, open area exposed with broad Wi-Fi coverage leaves the company network vulnerable to snooping and eavesdropping which is an entry point for a larger-scale attack. According to the scenario, Alliah only has one employee that is responsible for monitoring and administering its corporate network. That means it is highly unlikely that the AP covering the back-patio area has been hardened to industry standards. [Show More]

Last updated: 1 year ago

Preview 1 out of 8 pages

Reviews( 0 )

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
50
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 25, 2022

Number of pages

8

Written in

Seller


seller-icon
CourseWorks,Inc

Member since 1 year

8 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 25, 2022

Downloads

 0

Views

 50

Document Keyword Tags

More From CourseWorks,Inc

View all CourseWorks,Inc's documents »

Recommended For You

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·