100%(17)17 out of 17 people found this document helpful
This preview shows page 6 - 9 out of 10 pages.
B3. Deficiency with the Greatest ImpactThe greatest risk for the AEnergyCompany network is the WPA encryption and MAC addressfiltering. WPA even with encryption is not as secure as some other protocols, but with the MAC address filtering, it makes the network that much more vulnerable. For example, “an attacker gathers legitimate MAC address for use later in constructing spoofed frames” (Bidgoli, pg. 86). These are often used to mirror the MAC and mask their computer on the network. When MAC filtering is enabled, the network recognizes the attacker’s computer as an authorized device and they will then have access to network server information. The amount of damage that can be
Technology Upgrade Proposal7caused or information that can be compromised as a result could be unfathomable to a company, especially one with proprietary secrets, such as AEnergyCompany.C1. Personal Research StrategiesThere are several ways to obtain information and stay abreast with all thing’s informationtechnology related. One of my favorites is Flipboard because their technology section always hasfresh information on a variety of topics. I also enjoy using social media outlets such as twitter or following particular individuals on LinkedIn because they often share small bites of information or link out to interesting articles that are industry related. Lastly, I read articles weekly in Wired and PCMag.C1a. Current Technology ExamplesOne current technology that can address the issue of internet security is the new WPA3 Wi-Fi security protocol. There are many ways this protocol will help with securing the wireless network from sniffing, eavesdropping and potential unwanted guest. “WPA3 will protect against dictionary attacks by implementing a new key exchange protocol” (Barrett, 2018), unlike its predecessor that would allow hackers to have unlimited guess at your password, this will preventthat. In addition, this new method, after one guess, will force hackers to be authorized by the administrator.Another current technology that could address the current threat at the company would beusing an app similar to Onelogin. The software has an option for multi-factor authentication that can be enabled to protect network data. It prevents access to network items with solely the password, which is typically the only thing needed. Onelogin also offers a slew of other features that could potentially be helpful for the IT security team.
Technology Upgrade Proposal8C2. Staying InformedIn addition to the items discussed above, there are other things that I will use to further stay informed on current technologies. Researching and attend local classes will be a top priority and I will also attend at least one technology conference each year. Lastly, making a point of visiting more tech sites will be incorporated into my weekly schedule.