CSSS-5220 Week 6 Assignment

.docx

School

Webster University *

*We aren’t endorsed by this school

Course

5220

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

6

Uploaded by UltraKingfisherMaster1083

Report
Week 6 Written Assignment: Assessment Wireless Security Manoj Kumar Madala Webster University CSSS – 5220 Cybersecurity Threat Detection Professor Jason Ham February 25, 2024
Wireless Security: Wireless security keeps wireless networks and gadgets safe from hackers and people who aren't supposed to be there. Wireless security is critical in today's digital age since the growth of linked gadgets has rendered networks increasingly susceptible to cybersecurity assaults. An unprotected wireless network poses many risks, including the compromising of sensitive information, theft of personal identities, and damage to computer systems. Encryption Strong Encryption Protocols: Be sure to use robust encryption techniques are the most current and safest choice is WPA3. If WPA3 cannot be accessed, WPA2 encrypted with AES will suffice. Stay away from networks that’re employing WEP encryption since it’s so broken. Enable Password Protection: Always connect to networks that need a password. Your data is entirely exposed on open Wi-Fi networks thus you should never connect to them. Authentication: Avoid Automatic Logins: Disable the function that connects your device instantly to known Wi-Fi networks to avoid automatic logins. This lessens the possibility of inadvertently joining fraudulent networks that seem like authentic ones. Use Strong Passwords: Protect your Wi-Fi networks using robust passwords. Each one should be different and difficult to guess. Stay away from using things like your name, birthdate, or terms that anybody can look up in a dictionary. A password manager may help you create and remember complex passwords. Virtual Private Networks:
VPN for added security: A VPN makes your internet data private by encrypting it, connecting your device to the VPN server through a safe path. Protecting your data from eavesdroppers is crucial, and this is particularly true while using public Wi-Fi networks. Pick a trustworthy VPN service: When choosing a VPN, look for one that has a solid reputation for protecting user data. The absence of logs, robust encryption techniques, and leak prevention are all desirable aspects to look for. Disabling SSID Broadcast: Your wireless network's name, abbreviated as SSID, provides critical information about it. Disabling SSID broadcast might help you prevent unintentionally exposing your network to prospective attackers who utilize a method known as wardriving. In wardriving, a sort of piggybacking, an attacker researches a public Wi-Fi hotspot and then configures their machine to mimic it. Identifying potentially dangerous networks and taking precautions to avoid connecting to them should be possible. Network security relies heavily on the ability to detect and stop hostile networks. Malicious networks are ones that try to exploit network flaws, steal data, or disrupt routine operations. Some measures you may take to detect and avoid harmful networks are as follows: Red Flags to watch out for: Unsecured Networks: Networks without password protection should be avoided. With these networks, all your data is left vulnerable. Suspicious Network Names: Names that closely match actual companies in the region or are generic, such as "Free Wi-Fi," should raise suspicions about a network. Any of these things could be efforts to trick you into joining a dangerous network. Connection Issues: Problems establishing or maintaining a connection to a network may
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help