Week 8 Checkpoint- WLAN

Week 8 Checkpoint- WLAN - WLAN security and privacy...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Running head: WLAN 1 WLAN Stephen D, James IT-242 John Tinney August 11, 2011 University of Phoenix (Axia College)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
WLAN 2 WLAN Unwanted users can easily gain access to unsecured WLAN that do not require a password to access it. It can be difficult to keep a WLAN confined to just a certain building. Sometimes the WLANs will extend beyond the walls of the company and outside where anyone can pick up the signal. For this reason, it is important that all WLANs have a security feature enabled that will prevent unauthorized users from gaining access to the network. When securing a wireless network, it is important that the ESSID broadcast is turned off to prevent anyone outside the walls from acquiring the network. A WEP key is a security protocol which is specified in the Wi-Fi standard 802.11b and is created and designed to offer a
Background image of page 2
Background image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: WLAN security and privacy comparable to what one usually expects of a wired LAN. A wired LAN is usually protected by physical security mechanisms that are efficient for a controlled physical environment. This however may be useless for WLANs due to radio waves not being bound by walls that contain the network. Most people, who gain access to unprotected networks, only do it to browse the web; others gain access to both protected and unprotected networks with malicious intent. Some hackers gain access and try to steal sensitive data and important files. Securing a WLAN takes time and one needs to make sure they do it correctly and properly to ensure that no outside intruders can gain access to their network. WLAN 3 References Regan, P. (2004). Wide area networks. New Jersey: Pearson Education, Inc....
View Full Document

Page1 / 3

Week 8 Checkpoint- WLAN - WLAN security and privacy...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online