Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Beyond Hardening, Research Paper Example

Pages: 2

Words: 534

Research Paper

Wireless networks are now preferred instead of wired communications, as they are more convenient, portable and easy to use. However, wireless networks portray many security risks, as data is transmitted and received wirelessly. Likewise, these risks must be addressed for protecting the information assets and critical data. After hardening the wireless network by all means, three factors should be addressed i.e. confidentially, integrity and availability. For addressing these factors, organization need to conduct risk assessment in order to evaluate security controls placed for the wireless networks (Buttyán & Hubaux, 2008). Objective is to main the security for wireless networks via on ongoing maintenance process. Some of the factors that need to be addressed for maintaining wireless network security are given below:

  • There is a requirement of maintaining a complete picture of wireless network topology
  • Labeling and maintaining repositories for wireless devices and handheld devices as well
  • Establishing data backup processes on periodic basis

  • Conduct security testing and network assessment of the wireless network on periodic basis
  • Conduct ongoing security audits on a random basis to evaluate and monitor the effectiveness of the wireless network and handheld devices
  • Perform patch management for the wireless network, as required
  • Research and development for seeking more advanced wireless technology available in the new upcoming products
  • Wireless Network penetration testing for detecting any unknown vulnerabilities and threats that may be exploited by probable threats

 

Apart from these factors, risk assessment is necessary along with a wireless network security policy and determination of wireless products for acquisition (Buttyán & Hubaux, 2008). There are many wireless products that may expose small vulnerabilities that may be exploited by a threat. Am organizational plan is required to safeguard critical operations prior to adoption of wireless technologies. Some of the known issues that are more common may involve factory default settings that are known to the outside world. Moreover, the configuration of firewall is on the default configuration may also be assessed. After hardening the wireless network, encryption plays a vital role and for maintaining its effectiveness, encryption keys must be protected and maintained in a secure environment (Xiao, Shen, & Du, 2007). Furthermore, a wireless network must be scalable robust and open source for the latest products that are available in the market.

There is a requirement of asset identification, development and documentation, policy implementation, standards, procedures and guidelines for assuring the three factors as mentioned earlier i.e. confidentiality, integrity and availability for information systems. Below mentioned factors are necessary for implementing these requirements:

  • The information security policy should primarily focus on the wireless network and other handheld devices
  • Change management and configuration management should be in place for managing minor and major changes within the wireless network along with an effective and periodic patch management practices
  • There should be a standard for configuration of the security policy for ensuring modification in default settings along with assurance of processes
  • A periodic training campaign is required for raising awareness level to all the employees for minimizing vulnerabilities and threats within the wireless network and handheld devices

References

Xiao, Y., Shen, X., & Du, D. Z. (2007). Wireless network security Springer Science+Business Media, LLC.

Buttyán, L., & Hubaux, J. P. (2008). Security and cooperation in wireless networks: Thwarting malicious and selfish behavior in the age of ubiquitous computing Cambridge University Press.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Analysis of Americans With Disabilities Act, Research Paper Example

Introduction Legislators in Congress created and approved the Americans with Disabilities Act (ADA) in 1990, making it a part of US law. This policy aimed [...]

Pages: 11

Words: 3147

Research Paper

Polygamy Practise vs the Nepal Polygamy (Polyandry) Practise, Research Paper Example

Polygamy is referred to as the act of marrying multiple spouses at the same time. The word “polygamy” comes from the Greek for “many marriages.” [...]

Pages: 15

Words: 4223

Research Paper

Mealworms Experiment, Research Paper Example

Mealworms Experiment Conducted by Student at the External University Campus Science Labs Introduction According to Saud and Paudel (2018), pollution is one of the major [...]

Pages: 6

Words: 1567

Research Paper

Exegesis Psalm 1:1-6, Research Paper Example

God’s law on life is central in Psalms, as the author describes a life worth living. The book uses poetic formats to present an eloquent [...]

Pages: 4

Words: 1198

Research Paper

The Impact of Cyber Safety, Research Paper Example

The Impact of Cyber Safety on Educational Outcomes of Secondary School Students Introduction Rationale The internet enables students to access information anytime, anywhere, 24 hours [...]

Pages: 7

Words: 2038

Research Paper

Application of RFID Technology in Reverse Logistics, Research Paper Example

Background/ Introduction Reverse logistics is one of the most challenging aspects of the supply chain. While forward logistics is usually an orderly process, reverse logistics [...]

Pages: 1

Words: 353

Research Paper

Analysis of Americans With Disabilities Act, Research Paper Example

Introduction Legislators in Congress created and approved the Americans with Disabilities Act (ADA) in 1990, making it a part of US law. This policy aimed [...]

Pages: 11

Words: 3147

Research Paper

Polygamy Practise vs the Nepal Polygamy (Polyandry) Practise, Research Paper Example

Polygamy is referred to as the act of marrying multiple spouses at the same time. The word “polygamy” comes from the Greek for “many marriages.” [...]

Pages: 15

Words: 4223

Research Paper

Mealworms Experiment, Research Paper Example

Mealworms Experiment Conducted by Student at the External University Campus Science Labs Introduction According to Saud and Paudel (2018), pollution is one of the major [...]

Pages: 6

Words: 1567

Research Paper

Exegesis Psalm 1:1-6, Research Paper Example

God’s law on life is central in Psalms, as the author describes a life worth living. The book uses poetic formats to present an eloquent [...]

Pages: 4

Words: 1198

Research Paper

The Impact of Cyber Safety, Research Paper Example

The Impact of Cyber Safety on Educational Outcomes of Secondary School Students Introduction Rationale The internet enables students to access information anytime, anywhere, 24 hours [...]

Pages: 7

Words: 2038

Research Paper

Application of RFID Technology in Reverse Logistics, Research Paper Example

Background/ Introduction Reverse logistics is one of the most challenging aspects of the supply chain. While forward logistics is usually an orderly process, reverse logistics [...]

Pages: 1

Words: 353

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!