Alliah Company Network Infrastructure Vulnerabilities
C844: Emerging Technologies in Cybersecurity
TGMT -05:00
Table of Contents
A. WLAN vulnerabilities on the Alliah network......................................
...
Alliah Company Network Infrastructure Vulnerabilities
C844: Emerging Technologies in Cybersecurity
TGMT -05:00
Table of Contents
A. WLAN vulnerabilities on the Alliah network......................................................................................3
B. Mobile vulnerabilities..........................................................................................................................4
C. Mitigation and remediation of Alliah WLAN/mobile vulnerabilities...................................................5
D. Small business security measures........................................................................................................6
E. Bring your own device (BYOD) security............................................................................................7
F. References...........................................................................................................................................8
A. WLAN vulnerabilities on the Alliah network
According to the scenario presented that describes the Alliah Company WLAN environment,
there are multiple elements that can be considered weaknesses in the strength of Alliah’s
network. Alliah’s headquarters is in a large three-story converted warehouse with a large back
patio area for employees and a vacant third floor ready for expansion. Both areas are serviced by
the company Wi-Fi via access points placed around the facility. Access points (AP’s) are dummy
devices that are centrally administered by a wireless LAN controller and mindlessly transmit
network connection information such as the network name (SSID), the encryption type (if any), and
the strength of the signal.
Leaving a large, open area exposed with broad Wi-Fi coverage leaves the company network
vulnerable to snooping and eavesdropping which is an entry point for a larger-scale attack.
According to the scenario, Alliah only has one employee that is responsible for monitoring and
administering its corporate network. That means it is highly unlikely that the AP covering the
back-patio area has been hardened to industry standards.
[Show More]