CSSS-5220 Week 6 Assignment
.docx
keyboard_arrow_up
School
Webster University *
*We aren’t endorsed by this school
Course
5220
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
6
Uploaded by UltraKingfisherMaster1083
Week 6 Written Assignment: Assessment Wireless Security
Manoj Kumar Madala
Webster University
CSSS – 5220 Cybersecurity Threat Detection
Professor Jason Ham
February 25, 2024
Wireless Security:
Wireless security keeps wireless networks and gadgets safe from hackers and people who aren't
supposed to be there. Wireless security is critical in today's digital age since the growth of linked
gadgets has rendered networks increasingly susceptible to cybersecurity assaults. An unprotected
wireless network poses many risks, including the compromising of sensitive information, theft of
personal identities, and damage to computer systems.
Encryption
Strong Encryption Protocols:
Be sure to use robust encryption techniques are the most current
and safest choice is WPA3. If WPA3 cannot be accessed, WPA2 encrypted with AES will
suffice. Stay away from networks that’re employing WEP encryption since it’s so broken. Enable Password Protection:
Always connect to networks that need a password. Your data is
entirely exposed on open Wi-Fi networks thus you should never connect to them.
Authentication: Avoid Automatic Logins:
Disable the function that connects your device instantly to known
Wi-Fi networks to avoid automatic logins. This lessens the possibility of inadvertently joining
fraudulent networks that seem like authentic ones. Use Strong Passwords:
Protect your Wi-Fi networks using robust passwords. Each one should
be different and difficult to guess. Stay away from using things like your name, birthdate, or
terms that anybody can look up in a dictionary. A password manager may help you create and
remember complex passwords.
Virtual Private Networks:
VPN for added security:
A VPN makes your internet data private by encrypting it, connecting
your device to the VPN server through a safe path. Protecting your data from eavesdroppers is
crucial, and this is particularly true while using public Wi-Fi networks. Pick a trustworthy VPN service:
When choosing a VPN, look for one that has a solid
reputation for protecting user data. The absence of logs, robust encryption techniques, and leak
prevention are all desirable aspects to look for.
Disabling SSID Broadcast:
Your wireless network's name, abbreviated as SSID, provides
critical information about it. Disabling SSID broadcast might help you prevent unintentionally
exposing your network to prospective attackers who utilize a method known as wardriving. In
wardriving, a sort of piggybacking, an attacker researches a public Wi-Fi hotspot and then
configures their machine to mimic it.
Identifying potentially dangerous networks and taking precautions to avoid connecting to them should be possible.
Network security relies heavily on the ability to detect and stop hostile networks. Malicious
networks are ones that try to exploit network flaws, steal data, or disrupt routine operations.
Some measures you may take to detect and avoid harmful networks are as follows:
Red Flags to watch out for:
Unsecured Networks:
Networks without password protection should be avoided. With these networks, all your data is left vulnerable. Suspicious Network Names:
Names that closely match actual companies in the region or are generic, such as "Free Wi-Fi," should raise suspicions about a network. Any of these things could be efforts to trick you into joining a dangerous network. Connection Issues:
Problems establishing or maintaining a connection to a network may
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help