Ssid And Wlan Definitions Term Paper

PAGES
2
WORDS
846
Cite
Related Topics:

SSID & NETWORKS SSID's & Networks

The author of this report has been asked to answer a few brief questions as it relates to the security and safety of networks. The questions that will be answered include how one would design, develop and implement a security management system to protect an organization's internet and intranet access points. There will also be a description of what a service set identifier (SSID) is and what it does. Finally, there will be some talk about why SSID's tend to be vulnerable. While it may seem daunting to create and maintain a secure and well-functioning network, there are some common-sense steps that can and should be taken to do precisely that.

Analysis

There are two main things to focus on when designing and implementing a secure internet and intranet framework. The first is to control who and what is allowed to move in and out of a corporate network. The other thing is to control what is going on within that network. An example of the first is creating a wall of security between the network and the outside world. Whether this be encryption, firewalls (software- and hardware-based) and password protection, it has to be...

...

A tool that is widely used and serves a great purpose is a virtual private network. Such a network ensures that traffic is protected and encrypted even one or more workstations or computers in question are not physically within the home network. Key policy components as it comes to this part of the network security paradigm is the design and structure of the network's security systems and how precisely access to the network will be controlled. As technology and best practices improve, the network structure, both tangible and virtual, should change as well (Black Stratus, 2015).
As for controlling what is going on within the network itself, there are a few common examples of this. One example is requiring that workers change their passwords, use passwords that are not overly simple or easy to guess and have forced configurations that cause the computer to lock if there is inactivity for a certain amount of time. Enforcement of other good practices and general policies such as blocking of certain websites or types of websites (e.g. Facebook) as well as video streaming sites is just a start given the time and bandwidth…

Sources Used in Documents:

References

Black Stratus. (2016). 17 Data Security Best Practices For Business. Blackstratus.com. Retrieved 1 January 2016, from http://www.blackstratus.com/blog/practices-maintaining-data-security-business-environment/

Fluke. (2016). When SSIDs Go Bad -- Fluke Networks. Flukenetworks.com. Retrieved 1 January 2016, from http://www.flukenetworks.com/node/14353

Indiana. (2016). What is an SSID?. Kb.iu.edu. Retrieved 1 January 2016, from https://kb.iu.edu/d/anyp


Cite this Document:

"Ssid And Wlan Definitions" (2016, January 02) Retrieved May 20, 2024, from
https://www.paperdue.com/essay/ssid-and-wlan-definitions-2158516

"Ssid And Wlan Definitions" 02 January 2016. Web.20 May. 2024. <
https://www.paperdue.com/essay/ssid-and-wlan-definitions-2158516>

"Ssid And Wlan Definitions", 02 January 2016, Accessed.20 May. 2024,
https://www.paperdue.com/essay/ssid-and-wlan-definitions-2158516

Related Documents

Unless this protocol acquires a mainstream application, it is likely that it will never be put to extensive use. Applications Wireless technologies are becoming incredibly common. Convenience-conscious consumers like the lack of wires, although they dislike short battery lives and unexplainable hardware failures caused by jammed radio frequencies. Bandwidth is a primary consideration where wireless protocols are concerned. The upcoming 802.11n, capable of actual throughput rates of over 200Mb/s, is capable of