Information Technology  >  Study Notes  >  Company Network Infrastructure Vulnerabilities (All)

Company Network Infrastructure Vulnerabilities

Document Content and Description Below

Alliah Company Network Infrastructure Vulnerabilities C844: Emerging Technologies in Cybersecurity TGMT -05:00 Table of Contents A. WLAN vulnerabilities on the Alliah network.................. ... ....................................................................3 B. Mobile vulnerabilities..........................................................................................................................4 C. Mitigation and remediation of Alliah WLAN/mobile vulnerabilities...................................................5 D. Small business security measures........................................................................................................6 E. Bring your own device (BYOD) security............................................................................................7 F. References...........................................................................................................................................8 A. WLAN vulnerabilities on the Alliah network According to the scenario presented that describes the Alliah Company WLAN environment, there are multiple elements that can be considered weaknesses in the strength of Alliah’s network. Alliah’s headquarters is in a large three-story converted warehouse with a large back patio area for employees and a vacant third floor ready for expansion. Both areas are serviced by the company Wi-Fi via access points placed around the facility. Access points (AP’s) are dummy devices that are centrally administered by a wireless LAN controller and mindlessly transmit network connection information such as the network name (SSID), the encryption type (if any), and the strength of the signal. Leaving a large, open area exposed with broad Wi-Fi coverage leaves the company network vulnerable to snooping and eavesdropping which is an entry point for a larger-scale attack. According to the scenario, Alliah only has one employee that is responsible for monitoring and administering its corporate network. That means it is highly unlikely that the AP covering the back-patio area has been hardened to industry standards. [Show More]

Last updated: 3 years ago

Preview 1 out of 8 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Company Network Infrastructure Vulnerabilities document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$7.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

88
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 24, 2022

Number of pages

8

Written in

All

Seller


Profile illustration for CourseWorks,Inc
CourseWorks,Inc

Member since 3 years

9 Documents Sold

Reviews Received
2
0
0
0
0
Additional information

This document has been written for:

Uploaded

Aug 24, 2022

Downloads

 0

Views

 88

Document Keyword Tags

More From CourseWorks,Inc

View all CourseWorks,Inc's documents »

Recommended For You

Get more on Study Notes »

$7.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·