VULNERABILITIES - Complete the following matrix by filling...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
I would prefer to have a straight Hacker break into my network weather they are just trying for the attempt to show off their skills or working for the company to find the possible vulnerabilities so that they can be fixed before damage is done to the system or data stolen. I think since this paper was written they came out with WPA-PSK which if I had to choose I would go that route now but if I had to choose from the 3 listed I would go with Access Control or Mac Addressing this still has its draw backs like it can be spoofed and cannot add guest and harder to manage as a example but if it’s a closed system that does not have guest would be the best because the others like WEP and Authentication seem to have a lot more draw backs in security.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Axia College Material Appendix F Wireless LAN Vulnerabilities Matrix
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Complete the following matrix by filling in the blank boxes. Security protection Brief description Vulnerabilities Preve Mac address filtering MAC address are give to devices and only those devices are allowed on the network Key management, steal MAC address, Spoof MAC address Firewall pos filter Open system authentication (SSID beaconing) Limits admission to the network and meant to only allow authorized users on the network Management difficult only needs the 1 SSID, brute force attacks, capture challenge text. View SSID, steal SSID, Dictionary attacks force any er request to g OK respons numerous 4 will make it m attacker to d valid and inv This is inform threw WEP Works on a secret key shared between the device and the access point. Weak key, keystream, RC4pseudo-random number firewall...
View Full Document

This note was uploaded on 09/22/2011 for the course IT241 it241 taught by Professor H during the Spring '11 term at University of Phoenix.

Page1 / 2

VULNERABILITIES - Complete the following matrix by filling...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online