With the connection established the attacker logged

This preview shows page 9 - 11 out of 16 pages.

able to identify all network connections on the device. With the connection established, the attacker logged Employee X’s connection the company’s network. This allowed the attacker to gain access to the credentials used. With that information secure, spoofing the MAC of Employee X’s device would be the final piece needed. “In networking, Media Access Control (MAC) Spoofing is taking on the identity of another computer, and can be done for both malicious and benign reasons. It can be used to obscure the true MAC address or gain access to networks by using a MAC address that is identifiable by the network” (MAC Spoofing, 2018). With the MAC and credentials, the attacker was then able to access the network via mobile management server. The access was restricted through the use of web based applications and zero data stored on the mobile device. Comprehensive employee file and system permissions ensured that the attack was limited to the access that Employee X had. Continuous Process Improvement Plan The IT department initiated BYOD with wireless security in mind. Wireless technology has evolved over the years. One of the initial technologies used to encrypt and protect user data was Wired Equivalency Privacy (WEP). It is defined as “A security protocol, specified in the IEEE 802.11 standard, that is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN.” (Scarfone, Dicoi, Sexton, & Tibbs, 2008) WEP was the first wireless encryption standard created. The problem with WEP is that it has many widely known and exploited vulnerabilities. These vulnerabilities are why the company did not pursue WEP as the BYOD wireless encryption technology. The follow-up to WEP was Wi-Fi Protected Access (WPA) which transitioned to WPA2. WPA2 uses Advanced Encryption Standard which is capable of 256 bits keys and is FIPS-140 compliant. Federal
Project 2: Cybersecurity Incident Response 10 Information Processing Standards (FIPS) Publication 140-2 is a government standard for cryptographic keys and management. It is one of the most stringent standards published. Pre shared keys (PSK) is defined “a security method used to transfer a shared secret key between two parties in order to authenticate users. The process is initiated when PSK cipher suite(s) are included in the hello message to the client.” (Preshared Keys, 2018) WPA2-PSK uses the combination of a text passphrase up to 63 characters long along with the wireless network’s ID to generate unique encryption keys for each user. This technology best suited our needs, both in simplicity and security. Our BYOD currently uses WPA2-PSK, and we will review it on an annual basis for security risks. Though many only think of 802.11 when thinking of wireless, there are several others. Bluetooth is a shortwave wireless capability that runs in the 2.5GHz frequency range. The typical range of this technology is 33 feet. Near Field Communication is another range limited technology that at 13.56MHz and must be within seven to eight inches to communicate. Cellular is long distance wireless technology that has a varied range and frequency usage.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture