Incident Response Final .docx - 1 Incident Response Taylor...

This preview shows page 1 - 4 out of 17 pages.

1Incident ResponseTaylor A. WrightUniversity of Maryland Global Campus
INCIDENT RESPONSE 2Executive SummaryWireless local area network (WLAN) is a wireless computer network that links multiple devices. WLANs are typically used for organizations and companies. WLANs security is depended upon the components and devices on the network. WLANs are especially good for networks that allow a “bring your own device” BYOD policy. It is important to have logically separated WLANs for external use for security purposes. There are concerns that come about with the BYOD policy. Someone those concerns are lack of employee training, potential legal issues, and opportunities for data loss. When it comes to a BYOD policy on a WLAN it is important to build reliable WLAN so that the risk associated with a bring your own device are mitigated as best as possible. The first step in this process is to increase the Wi-Fi coverage. Nextis to install wireless access points (APs). APs a wireless network device that acts as a portal for devices to connect to a local area network. Lastly, after designing WLAN security configurationsfor devices and access points, an organization should determine how the configurations will be implemented, evaluate the effectiveness of the implementations, deploy the implementations to the appropriate devices, and maintain the configurations and their implementations throughout the devices’ lifecycles (Likier, 2015). In conclusion, it is important to know all strategies and tools to allow for a prosperous bring your own device on a wireless local area network.
INCIDENT RESPONSE 3Wireless and BYOD Security PlanBring your own device (BYOD) is a fairly new practice organizations are adopting. BYOD is a practice that allows users of the network to bring their own personal computers and any other mobile device that connects to the work networks to complete work from (Horwath, 2013). The BYOD practice has many benefits associated with it. Some of those benefits include reduced technology cost for the company, flexibility for employees, and convenience for all parties involved. While the benefits are amazing, the BYOD practice creates all sorts of security vulnerabilities such as poor policies, data leakage, and inability to control devices. Extra policies must be in place in order for a BYOD program to work smoothly (Ogden, 2017). Some policies are strength of password, require a use of a VPN, location tracking, and real time updates/patches. Data loss is the riskiest threat with the BYOD policy. This is because security barriers or predisposed malware to the system is not always accounted for. Although implementing security controls directly onto a worker's personal equipment might be a challengefor many organizations, it is imperative that employers design properly documented BYOD policies to mitigate risk and data loss (Horwath, 2013). Ways to control data leakage is the requiring the use of a VPN when conducting business. Lastly, controlling devices that personally

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture