Introduction
The freedom to access the corporate network without being reinforced, versatility while getting to the internet, expanded dependability, and adaptability is a portion of the factors driving the local area network technology. Different variables that add to colossal development of Wireless Local Area Networks (WLANs) are decreased establishment time, long haul cost reserve funds, and establishment in hard-to-wire zones. For GHS to best ensure safety for its data, there is a requirement for security chance appraisal. The need will assist with deciding the dangers its data is inclined to, and afterwards create fitting safety efforts to counter the dangers. The paper evaluates the security dangers related to WLANs that confines use in GHS and recommends its countermeasures that ought to be set up for secure execution as an indispensable piece of LAN.
WLAN Overview
Basic WLAN Components
For one to set up a local area network, two fundamental parts must be accessible: remote system cards and remote access point(s). The third primary segment, remote connect, is utilized to interface at least two structures. The remote system cards are joined to versatile figuring gadgets and the interface to a connection. A connection is a centre that gives remote customers the capacity to append to the wired LAN backbone. To keep up an inclusion territory, multiple connections are utilized as in cell structures, which are utilized by phone suppliers to keep up an inclusion zone. Remote scaffolds, then again, empower fast, long-range open-air interfaces between structures. Based on line-of-sight, remote extensions are most certainly not influenced by snags, for example, interstates, railways, and waterways, which regularly represent an issue for copper and fibre-optic link (Shourbaji, 2016).
WLAN Transmission Technologies
Remote LANs are commonly classified by the transmission system being used. All available remote LAN items can be categorized as one of the classifications underneath:
Infrared (IR) LANs: Infrared light does not infiltrate hazy dividers; accordingly, an individual cell of an IR LAN is restricted to a solitary room. No authorizing is required. Spread Spectrum LANs: Here, spread range transmission innovation is utilized, and as a rule, the LANs work in ISM (Industrial, Scientific, and Clinical) groups to abstain from permitting prerequisite. Narrowband Microwave: It works at microwave frequencies. Some work at rates that require FCC allowing, others work at the unlicensed ISM groups, yet they do not utilize spread range (Shourbaji, 2016).
WLAN Spectrum Allocation
The infrared and spread range remote LAN advancements work in ISM (Industrial, Logical, and Medical) groups. The radio range is unlicensed (Shourbaji, 2016).
WLAN Topologies
The IEEE 802.11 standard characterizes three essential topologies to be bolstered by the MAC layer execution. These are Independent Basic Service Set (IBSS), Basic Service Set (BSS), and Extended Service Set (ESS). The 802.11 standard further characterizes the accompanying two modes: Ad hoc and infrastructure (Shourbaji, 2016).
WLAN Applications
The following applications are made possible through the power and flexibility of wireless LANs: nomadic access, LAN extension, and ad-hock networking, and cross-building interconnect (Shourbaji, 2016).
Security Threats and Issues
Passive Attack
It comprises of unapproved access to an advantage or system for a reason for eavesdropping/ listening in or traffic investigation, however, not to change its substance. It is precarious to recognize because the information is unaffected. Thus, prominence is on avoidance (encryption), not identification. Listening in/eavesdropping is the ability to screen transmissions for message content. An attacker tunes in and blocks remote signals between the AP and remote customer. Traffic investigation is the ability to pick up insight by observing transmission for examples of interchanges or perform bundle examination. It can be conveyed out in any event, when the messages are encoded and cannot be decrypted (Sunday, 2018).
Active Attack
Unapproved access to a system with the goal of either making changes to a message, information stream, or document, or to upset the working of a system administrator. The active attack may be in terms of one or a combination of four types: masquerading, replay, message modification, and denial-of-service (DoS) (Sunday, 2018).
Masquerading: the attacker imitates the user and gets unapproved privileges. It could be endeavoured using taken login IDs and passwords, through finding security holes in programs, or through bypassing the verification component. When the correct access to the association's necessary information is picked up, the attacker might have the option to alter and erase programming and information and make changes to arrange the design and directing data. Replay: otherwise called Man-in-the-Middle, attacker screens transmissions and retransmits messages as the real client to fool the receiver into unapproved tasks, for example, bogus ID or verification or a copy exchange. Message modification: the attacker adjusts a legitimate message by erasing, adding to, altering, or restructuring the information. Finally, denial-of-service (DoS): the attacker prohibits or prevents the regular use of the running of communications facilities (Sunday, 2018).
WLAN Recommendations
Conducting Penetration/Vulnerability Testing
The general target of the testing is to find territories of GHS network where uninvited individuals can misuse security vulnerabilities. These tests are performed utilizing automated tools that search for specific shortcomings. The shortcomings are specialized defects or vulnerabilities to abuse, with the outcomes sown to the network owner with an appraisal of their hazard to the network (Souppaya, Scarfone, 2019).
Using a wireless intrusion protection system to check activities; WIPS is a system checking instrument that runs nonstop and pinpoints attacks or endeavoured assaults on the remote system. It is an expansion of the propelled insurance found in wired firewall and virtual private system security frameworks yet with an emphasis on local area network (WLANs). It utilizes traffic investigation to monitor attack marks, convention mistakes, atypical conduct, and approach infringement, creating alarms, furthermore, protective activities (Souppaya, Scarfone, 2019).
Investigating using wireless analyzers; WLAN and range analyzers assume significant job during vulnerability evaluation, from the beginning to end. A blend gives an instrument that offers both execution and security observing capacities for remote LANs (Souppaya, Scarfone, 2019).
Recommendations for Implementing the Solutions
These countermeasures are at this point introduced and designed to execute and authorize the security strategy. This is accomplished through PDAs station and AP hardening, rogue detection and exclusion, and use of 802.11/802.1X safety efforts (Souppaya, Scarfone, 2019).
For rogue management, a report might prescribe physical expulsion of found high-SNR APs associated with the GHS network without authorization and independent draft 802.11n APs introduced by staff members (Souppaya, Scarfone, 2019).
WLAN Infrastructure Hardening: Proposals of entrance test results may be countermeasures, as: changing AP defaults, debilitating pointless administrations, dispensing with unused ports, utilizing more grounded administrator passwords or confirmation strategies, incapacitating wireless side the executives, and confining wired-side to specific IP addresses. A further illustration is noted on VLANs, utilizing AP channels to forestall course updates or LAN communicates from getting to the wired system, adjusting DoS edges, and applying firmware overhauls/patches (Souppaya, Scarfone, 2019).
PDAs station hardening: this might include configuring PDAs to associate only to GHS's ESSIDS in structure mode, checking 802.1X server licenses to avoid rogue AP is also crucial.
Securing data in transit: it could include blocking of employee relations to guest WLAN if the risk examination indicates that the risk is on the high level. In substitute, new users might need to protect themselves with VPN (Souppaya, Scarfone, 2019).
Practice to Use
I will implement the use of WI-FI accesses 2: WPA2 is a security convention that utilizes all the significant security components related in the 802.11i IEEE security detail, and it will assist with keeping GHS remote system secure (Gary, 2016). To protect the GHS network, I will incorporate a devoted wireless intrusion prevention system (IPS) inside the remote security. These gadgets work by checking and recognizing progressively terrible and focused on WLAN attacks use AP spoofing, malicious broadcasts, and different strategies (Gary, 2016). Finally, in circumstances where gadgets cannot utilize the most secure type of Wi-Fi encryption and validation, I will put these gadgets onto their virtual system called support legacy WIFI devices (Gary, 2016).
Conclusion
In summary, wireless networks are favoured by numerous organizations and GHS is not an exception. They take into consideration a more noteworthy utilization of cell phones. Notwithstanding, to benefit from these networks, it is significant that they have appropriate security conventions set up.
References
Gary, S. (2016, September 9). WLAN Security: Best Practices for Business Wireless Network Security. Retrieved March 29, 2020, from Built in Chicago: https://www.builtinchicago.org/blog/wlan-security-best-practices-business-wireless-network-security
Murugiah Souppaya; Karen Scarfone. (2019, April 24). Recommendations of the National Institute of Standards and Technology. Guidelines for Securing WLANs, pp. 34-67. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf
Shourbaji, I. A. (2016, May 13). What is WLAN? An Overview of Wireless Local Area Networks, pp. 2-9. https://arxiv.org/ftp/arxiv/papers/1303/1303.1882.pdf
Sunday, N. A. (2018, August 23). A brief review of WLAN. Wireless Local Area Network Security Risk Assessment and Counter Measures, pp. 3-20. https://www.diva-portal.org/smash/get/diva2:831198/FULLTEXT01.pdf
Cite this page
Essay Sample on Secure Access & Flexibility with WLANs: Benefits of a LAN Network. (2023, May 07). Retrieved from https://proessays.net/essays/essay-sample-on-secure-access-flexibility-with-wlans-benefits-of-a-lan-network
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Ethical and Legal Issues While Designing and Managing an Enterprise Network
- Cyber Defense and Artificial Intelligence Paper Example
- Data Management in Equifax Paper Example
- Device-Based Security to Improve User Privacy Article Reviw Paper Example
- Essay Example on Modern Technology: Testing and Teaching in Linguistics
- Paper Example on Preserving Patients' Health Records: Vital Info & EHRs
- Essay Example on Cloud Computing: Breaking Through the Digital Storage Limit