B3 deficiency with the greatest impact the greatest

This preview shows page 6 - 9 out of 10 pages.

B3. Deficiency with the Greatest Impact The greatest risk for the A Energy Company network is the WPA encryption and MAC address filtering. WPA even with encryption is not as secure as some other protocols, but with the MAC address filtering, it makes the network that much more vulnerable. For example, “an attacker gathers legitimate MAC address for use later in constructing spoofed frames” (Bidgoli, pg. 86). These are often used to mirror the MAC and mask their computer on the network. When MAC filtering is enabled, the network recognizes the attacker’s computer as an authorized device and they will then have access to network server information. The amount of damage that can be
Technology Upgrade Proposal 7 caused or information that can be compromised as a result could be unfathomable to a company, especially one with proprietary secrets, such as A Energy Company. C1. Personal Research Strategies There are several ways to obtain information and stay abreast with all thing’s information technology related. One of my favorites is Flipboard because their technology section always has fresh information on a variety of topics. I also enjoy using social media outlets such as twitter or following particular individuals on LinkedIn because they often share small bites of information or link out to interesting articles that are industry related. Lastly, I read articles weekly in Wired and PCMag. C1a. Current Technology Examples One current technology that can address the issue of internet security is the new WPA3 Wi-Fi security protocol. There are many ways this protocol will help with securing the wireless network from sniffing, eavesdropping and potential unwanted guest. “WPA3 will protect against dictionary attacks by implementing a new key exchange protocol” (Barrett, 2018), unlike its predecessor that would allow hackers to have unlimited guess at your password, this will prevent that. In addition, this new method, after one guess, will force hackers to be authorized by the administrator. Another current technology that could address the current threat at the company would be using an app similar to Onelogin. The software has an option for multi-factor authentication that can be enabled to protect network data. It prevents access to network items with solely the password, which is typically the only thing needed. Onelogin also offers a slew of other features that could potentially be helpful for the IT security team.
Technology Upgrade Proposal 8 C2. Staying Informed In addition to the items discussed above, there are other things that I will use to further stay informed on current technologies. Researching and attend local classes will be a top priority and I will also attend at least one technology conference each year. Lastly, making a point of visiting more tech sites will be incorporated into my weekly schedule.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture