Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

ISSC343 Central Texas College High Speed WLANs and WLAN Security Discussion

ISSC343 Central Texas College High Speed WLANs and WLAN Security Discussion

Hello,
I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.
You will:

Describe the differences between authentication and privacy
Describe how WLANS can protect both

Student one:
Hello everyone,
There are many attacks that could be initiated on wireless local area networks (WLAN). Some examples of these attacks are MAC spoofing, Denial of Service (DoS) or Distributed Denial of Service (DDoS), man in the middle, and social engineering to name a few. Any device that is connected at any given time to the internet is by nature susceptible to being attacked and breached by unauthorized users. Users need to be verified that they can have permission to access the network, in other words authenticated. This would be one of the first steps in helping deter unwanted guests on a secure network. Another initial step is to encrypt or scramble one’s own data being transmitted as much as possible, this being the privacy of the network.
Wired Equivalent Privacy (WEP), standard 802.11-1997, was great in its time initially, but since then it has been outdated as technology has advanced. Currently, Wi-Fi Protected Access version 2 (WPA2) is the most up to date protocol against WLAN attacks. Along with WPA2, using Virtual Private Networks (VPN) with unsecured Wi-Fi and upgrading all hardware and software as soon as possible will always help deter and lessen unwanted guests and their attacks on WLANs. Another helpful tip is to change the default SSID and passwords of routers and adding long and complex passwords. In a business setting, keeping up in awareness meetings will also help against phishing attacks.
Thank you again for reading. I am sure I left somethings out at the moment, and would appreciate feedback.
-Andres
References
(2019, 06). Wireless Security Protocols: WEP, WPA, WPA2, and WPA3. Retrieved 06, 2019, from https://www.netspotapp.com/wifi-encryption-and-security.html
Karasek, J. (2019, 01). Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping. Retrieved 01, 2019, fromhttps://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/security-101-protecting-wi-fi-networks-against-hacking-and-eavesdropping

Student two:
Hello classmates!
“Authentication is the process of verifying that the client device has permission to access the network.” (Olenewa 2014). Having said this, it’s just like what it sounds. Authentication requires the user to pass some preliminary barrier before gaining access to the specified device or network. Password protection is the most common form of authentication when it comes to devices and network protection. Networks and devices vary; some require authentication from the same user every time the device or network is accessed and some require only a one time authentication. Privacy is different from authentication because authentication just ensures that the user has permission to be connected to the network. “Privacy is a collection of processes that attempts to ensure that unauthorized users cannot understand wireless transmissions.” (Olenewa 2014). These Privacy processes utilize data encryption so unauthorized users can’t understand or decode anything unless they have the encryption key.
WLAN connections utilize both authentication and privacy methods. To connect to a specified WLAN connection, a secure network requires the correct authentication password to connect to it. Oftentimes this password is unique and complicated to keep it more secure and out of reach from unauthorized users. Different connection use different bit type pre shared encryption keys based on the type of connection that the device is using. In addition, some devices rotate encryption keys after a certain amount of time. Thanks for reading my post this week, good luck to everyone on all there assignments this week!
Reference” Olenewa, J. Guide to Wireless Communications. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/97812857002″¦
-Paden

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Topnotch Essay only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided byTopnotch Essay are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Topnotch Essay is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Topnotch Essay, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.