Our findings on solomons laptop shows that he may be

This preview shows page 9 - 12 out of 17 pages.

Our findings on Solomon’s laptop shows that he may be a victim of Media AccessControl (MAC) Spoofing. “MAC spoofing is the technique to effectively change the MACaddress that your network interface appears to have. It doesn't change the burned-in address, itmerely changes what other devices think your interface's MAC address is.” (Perot, 2016). This ishow his address logged in from different locations, outside of his normal routine. Since mostphones, tablets, laptops and other devices built after 2015 come with fingerprint scanning. Usingthe screen lock feature the user must log back in after 90 mins. MobileIron can also send remotecodes to lock a device, if the user validates with a fingerprint and/or password it will authenticatethe session. Continuous Improvement PlanProtecting the network and our employees personally identifiable information (PII) iskept at the forefront of our IT security policies and procedures. When the company first launched
Incident Response10our wireless capabilities, we began using a technology called Wired Equivalency Privacy (WEP).WEP was developed in the late 1990’s as the first method of encrypting the 802.11 standard.WEP was designed with the intension to prevent snooping of wireless data by hackers,transmitted from access points and clients. By 2001 experts noticed several flaws in WEP,leading a recommendation of phasing out the usage of the encryption. For authentication andencryption, WEP uses RC4 stream cipher, a 40-bit pre-shared key. With a major hack of thecredit card industry in 2009 the government put restrictions on the usage of WEP. This keylength was later changed to a 104-bit key after the Government lifted the restriction. (Wong,2003)Wi-Fi Protected Access (WPA) was created because of the numerous flaws that wererevealed in WEP. WPA introduces modes for personal use and enterprise usage. Enterprise modeused 802.1x authentication with the Extensible Authentication Protocol or EAP. The personalmode used pre-shared keys for easy use, unlike enterprise mode that needed and authenticationserver. It also introduced and enhanced RC4 cipher call Temporal Key Integrity Protocol (TKIP).Its improved security by using a 256-bit key per packet. It was also but it with backwardcompatibility to WEP, by doing simple firmware updates to WEP based devices. (Wong, 2003)We are currently monitoring traffic using Wi-Fi Protected Access 2 (WPA2) which wasdesignated by the IEEE in 2004 as 802.11i. Even though it still has vulnerabilities it’s known tobe the most secure standard currently available. WPA2 replaces RC4 and TKIP with strongerversions of encryption and authentication, Advanced Encryption Standard (AES) and CipherBlock Chain Message Authentication Code Protocol (CCMP). AES is formed from three
Incident Response11symmetric block ciphers that encrypt and decrypt 128-bit data blocks. CCMP protects data byallowing only authenticated user to access it. WPA2 made traveling from one access point toanother seamless without having to reauthenticate the user. (Wong, 2003)Although there are other protocols that we will have with the BYOD policy, the one thatwill be a huge debate is Bluetooth. Though it may be a useful tool for headphones or Fitbit

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture