Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Wireless Networks, Research Paper Example

Pages: 3

Words: 774

Research Paper

Wireless networks operate on wireless fidelity spectrum that emits and transmit waves and mobile networks operates on radio waves. These waves contain data that travels through the air and received by a wireless access point or wireless router. The risk is defined as the likelihood of different threats via different circumstances, which are affecting the wireless network and information systems. The circumstances should consider the strategy, security measures, environmental measures, own experience and the experience of other connected entities in the context of information security failure. The impact calculation is also required in terms of data integrity, availability; confidentiality and the cost associated with the fixing systems, lost availability and other related issues which are of prime concern to the network and information system operations (Ramig, 2010). Measurements consist of

  • Cost which is used to protect the information and Wireless networks
  • Value of the information and Wireless networks
  • Threat probability and occurrence
  • Effectiveness of Controls

Risk Management

As per Business Dictionary, for performing risk analysis for the enterprise network, stages are divided in order to focus specific stage precisely. The objective is to make the system secure from threats and vulnerabilities. The methodology will illustrate decisions as outputs for each stage.

The first step will be to analyze borders of the network and information system resources and exchange of information within the enterprise network. The first step is to gather information which lays the foundation for conducting risk analysis. The system related information includes hardware, software, data, IT support staff, processes performed on the wireless networks, mission critical systems, data sensitivity. The operational environment of the enterprise network includes network design and topology, security architecture, system users, functionality of the wireless networks, methodologies for protecting the data in parallel with availability, confidentiality and integrity, input and outputs of the network, management controls, security controls, physical security, and environmental security controls. The outputs for this stage are system boundaries, System functionality, Criticality of the system and data, Sensitivity of the system and data.

The second step is to analyze any potential threats for the network. While analyzing threats, is it essential to consider all possible, potential threats and sources which may disrupt or harm the wireless networks and information systems. The common threats related to natural disasters are floods, tornadoes, earthquakes etc. The common threats related to human includes hacking, cyber crime, viruses, malicious software attack, un authorized access to organization’s critical data, and deliberate actions. The environmental threats include substantial power failure, any chemical leakage, liquid spilled on any computing component etc. The output of this step is the identification of potential threats, which may disrupt the network and information systems in the future.

The third step is to analyze any possible vulnerability within the wireless networks. This step concludes the weaknesses and flaws which are currently present in the wireless network security architecture. The assessment of possible vulnerabilities is not an easy task as some previous history is required to perform vulnerability assessment. If the wireless network is operational, a thorough analysis of the network security features and controls is conducted. It will also include technical and procedural elements for protecting the wireless network.

The fourth step is to identify and evaluate controls along with the likelihood against these controls of the wireless network which are implemented by the organization. The controls are divided in to two categories. Technical control consists of software or hardware for protecting the network. For example, intrusion detection system, firewall, identification and authentication software etc. Technical controls require technical expertise.

The fifth step is to rate the probability of potential vulnerability by evaluating the source and capability of threats, nature of vulnerability and efficiency of current controls. The rating is categorized in high, medium and low priorities.

The sixth step is the undesirable impact which is the output of successful threat analysis of potential vulnerabilities. The impact analysis is conducted by considering current processes of the enterprise network, mission critical data and systems, data and system sensitivity.

Controls Risk Severity Identified Risks
Enable Encryption High risk Wireless Network Security Breach

Wireless traffic session hijacking

Strong Password, Firewall High risk Information Leakage
Highly likely to occur Medium risk  IT Security Framework
Effective Patch Management including Virus definition updates Medium/low risk Vulnerabilities in Windows
Configure Password to the Access point High risk Unauthorized access to Wireless Network

I have conducted a detailed risk management for the wireless network. Risk management should be on a periodic basis and residual risks are always there, so I think I can add value to your computer network in terms of Confidentiality, Integrity and Availability.

References

Ramig,2010. Renee. “Online Tools for Research–Elementary and Middle School Style.” MultiMedia & [email protected] 17.5 (2010): 15. Print.

Standard risk definition Retrieved 12/23/2010, 2010, from http://www.businessdictionary.com/definition/standard-risk.html

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Media Account Analysis: National Geographic, Research Paper Example

National Geographic is an established Instagram account with over 241 million followers. In all its posts, National Geographic focuses on oceans, land, wildlife, human ingenuity, [...]

Pages: 2

Words: 567

Research Paper

Health Reasons for Abortion, Research Paper Example

Abortion remains one of the most controversial subjects in the world, as some people support that it should be freedom while others believe it is [...]

Pages: 3

Words: 720

Research Paper

Indigenous Caribbean Art, Research Paper Example

Introduction The portrayal of cultural characteristics that are important to the populations that are native to that location is a common feature of the indigenous [...]

Pages: 9

Words: 2341

Research Paper

Jean Lamarr, Research Paper Example

Introduction Different cultures have different ways of fostering creativity and imagination. However, since people might be impacted by values and norms from different cultures, artists [...]

Pages: 5

Words: 1511

Research Paper

The Oppression of Indigenous People in Layli Long Soldier’s Whereas, Research Paper Example

Introduction Colonization perpetrated the oppression of indigenous communities. Also, the struggle against cultural imperialism lay at the heart of oppression as the culture of native [...]

Pages: 7

Words: 2029

Research Paper

Reviled and Loved Prompt, Research Paper Example

Introduction The media and channels of communication are vital in passing information in a society (Lovari et al., 2020, p315-p328). The information is specifically addressed [...]

Pages: 7

Words: 1948

Research Paper

Media Account Analysis: National Geographic, Research Paper Example

National Geographic is an established Instagram account with over 241 million followers. In all its posts, National Geographic focuses on oceans, land, wildlife, human ingenuity, [...]

Pages: 2

Words: 567

Research Paper

Health Reasons for Abortion, Research Paper Example

Abortion remains one of the most controversial subjects in the world, as some people support that it should be freedom while others believe it is [...]

Pages: 3

Words: 720

Research Paper

Indigenous Caribbean Art, Research Paper Example

Introduction The portrayal of cultural characteristics that are important to the populations that are native to that location is a common feature of the indigenous [...]

Pages: 9

Words: 2341

Research Paper

Jean Lamarr, Research Paper Example

Introduction Different cultures have different ways of fostering creativity and imagination. However, since people might be impacted by values and norms from different cultures, artists [...]

Pages: 5

Words: 1511

Research Paper

The Oppression of Indigenous People in Layli Long Soldier’s Whereas, Research Paper Example

Introduction Colonization perpetrated the oppression of indigenous communities. Also, the struggle against cultural imperialism lay at the heart of oppression as the culture of native [...]

Pages: 7

Words: 2029

Research Paper

Reviled and Loved Prompt, Research Paper Example

Introduction The media and channels of communication are vital in passing information in a society (Lovari et al., 2020, p315-p328). The information is specifically addressed [...]

Pages: 7

Words: 1948

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!