D of the three wep is the least secure while wpa2 is

This preview shows page 9 - 12 out of 19 pages.

WPA’s encryption) (Diffen, n.d.). Of the three, WEP is the least secure, while WPA2 is the most secure, with the least vulnerabilities. The WPA2 protocol, supports an encryption scheme using pre-shared keys (PSK). The PSK is a passphrase that is never actually explicitly shared but computed by each device based
Cybersecurity Incident Report 10 on a concatenation of the authenticator’s & client’s MAC addresses, and the authenticator’s & client’s nonce (a value that has a one-time use for a key generation) (Surecould, 2017). While WPA2 using the PSK can be FIPS 140-2 compliant, it is not necessarily so (a standard that specifies the security requirements for protecting sensitive information). There are two conditions to ensure its’ compliance; that the client supports WPA2-Enterprise 802.1x authentication and key derivation (it must rely on FIPS approved algorithms to function in these modes), and for it to use AES-CCMP encryption and decryption protocols that are FIPS validated. There are three alternative protocols that could potentially be used, and thus should be examined before being ruled for or against their use on our network: Bluetooth, ZigBee, and the Worldwide interoperability for Microwave Access (WiMax) protocols. Each has their own pros, and cons, and will be examined further below. The Bluetooth protocol sends data over short distances. It is commonly used in a personal area network (PAN), with devices such as phones, headphones, smart watches, fitness trackers, etc. It uses ultra-high frequency radio waves for data transfer and is primarily used in smaller devices (Ray, 2017). The pros of Bluetooth are that there is a lesser chance of device interference, as it uses low powered wireless signals and uses frequency hopping to minimize possible interference (Techspirited, n.d.). The cons are that it has a limited data rate, of up to 25 mbps, and covers a small radius due to the low powered wireless signals (Techspirited, n.d.). The ZigBee protocol offers 128-bit AES encryption, and is typically used in mesh networks (which can perform in an infrastructure mode, or as an ad hoc network), and has multiple pathways for data transfer (Ray, 2017). The pros of a ZigBee network, are that it has great power management capabilities, intended for devices where batteries are not intended to be
Cybersecurity Incident Report 11 replaced for a long period of time, and for the quick linking time (30 ms as opposed to Wi-Fi with 3 seconds) (Hines, 2016). The cons are that, the low powered signals it uses for communication limit the bandwidth much more than Wi-Fi (Hines, 2016). The WiMax protocol is a wide ranged protocol, that was previously used by some cell phone carriers (they have since transitioned to use LTE 4g connections). The only pro of a WiMax protocol, is that it would have a long distance of communication (it would be possible to reach up to 30 miles from the base station under optimal conditions). The cons are that there is a limited data rate when compared to data rate (up to 70 mbps under optimal conditions), or LTE 4g, and the cost of acquiring and maintaining (even just one) base station (Brain, & Grabianowski, 2004) (similar in concept to a cellular tower).

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture