Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Beyond Hardening, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Wireless networks are now preferred instead of wired communications, as they are more convenient, portable and easy to use. However, wireless networks portray many security risks, as data is transmitted and received wirelessly. Likewise, these risks must be addressed for protecting the information assets and critical data. After hardening the wireless network by all means, three factors should be addressed i.e. confidentially, integrity and availability. For addressing these factors, organization need to conduct risk assessment in order to evaluate security controls placed for the wireless networks (Buttyán & Hubaux, 2008). Objective is to main the security for wireless networks via on ongoing maintenance process. Some of the factors that need to be addressed for maintaining wireless network security are given below:
- There is a requirement of maintaining a complete picture of wireless network topology
- Labeling and maintaining repositories for wireless devices and handheld devices as well
- Establishing data backup processes on periodic basis
- Conduct security testing and network assessment of the wireless network on periodic basis
- Conduct ongoing security audits on a random basis to evaluate and monitor the effectiveness of the wireless network and handheld devices
- Perform patch management for the wireless network, as required
- Research and development for seeking more advanced wireless technology available in the new upcoming products
- Wireless Network penetration testing for detecting any unknown vulnerabilities and threats that may be exploited by probable threats
Apart from these factors, risk assessment is necessary along with a wireless network security policy and determination of wireless products for acquisition (Buttyán & Hubaux, 2008). There are many wireless products that may expose small vulnerabilities that may be exploited by a threat. Am organizational plan is required to safeguard critical operations prior to adoption of wireless technologies. Some of the known issues that are more common may involve factory default settings that are known to the outside world. Moreover, the configuration of firewall is on the default configuration may also be assessed. After hardening the wireless network, encryption plays a vital role and for maintaining its effectiveness, encryption keys must be protected and maintained in a secure environment (Xiao, Shen, & Du, 2007). Furthermore, a wireless network must be scalable robust and open source for the latest products that are available in the market.
There is a requirement of asset identification, development and documentation, policy implementation, standards, procedures and guidelines for assuring the three factors as mentioned earlier i.e. confidentiality, integrity and availability for information systems. Below mentioned factors are necessary for implementing these requirements:
- The information security policy should primarily focus on the wireless network and other handheld devices
- Change management and configuration management should be in place for managing minor and major changes within the wireless network along with an effective and periodic patch management practices
- There should be a standard for configuration of the security policy for ensuring modification in default settings along with assurance of processes
- A periodic training campaign is required for raising awareness level to all the employees for minimizing vulnerabilities and threats within the wireless network and handheld devices
References
Xiao, Y., Shen, X., & Du, D. Z. (2007). Wireless network security Springer Science+Business Media, LLC.
Buttyán, L., & Hubaux, J. P. (2008). Security and cooperation in wireless networks: Thwarting malicious and selfish behavior in the age of ubiquitous computing Cambridge University Press.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee