Friday, December 6, 2019

Implementation Enterprise Wireless Network -Myassignmenthelp.Com

Question: Discuss About The Implementation Enterprise Wireless Network? Answer: Introduction Network design in various organizations have reported serious cases of security breaches that have been emanating from network designers, organizational network security personnel, employees of the operations, stakeholders and external entities. In regard to network security lapses, concern has been raised on the need to come up with strategies to tame unethical professional practices. To make network security field more professional, various ethical practices can be followed when designing and implementing enterprise network. Such practices would help to govern the nature of the network to be set up, control behavior of network security guys while on duty and define required operational standards either nationally or internationally. Ethical implications in design and implementation of secure network All professionals are guided by ethical practices that govern how activities should be done in an organization. Similarly, professionals in IT network design should governed by ethical practices that hold them responsible for any activity in their line of executing duties. Discharging duties and responsibilities with diligence and honest Security personnel should be able to perform all duties with due diligence and highest standards of honesty. All teams involved in network design are required to follow specific organizational modalities of operations while executing their duties with openness. In this regard, when network designers or organizational IT security team finds some of the proposals made by the organization unfit to be implemented in organizational operations, they should be free to raise their concern [11]. Such an instance helps to clear any doubt if necessary recommendations made by various security teams were not implemented due to organizational failure. While the security team makes their network proposals, they are to be guided by motives of securing organizational operational data. They should demonstrate why it is important, outline the actual price to be involved and how such measures would be of great importance to the organization [2]. All recommendations and other issues raised should be docu mented to make them valid and tangible when needed. Documentation would serve as proof of genuine recommendations made and were either implemented or rejected on some basis such unavailability of enough funds. Performing duties within the law and in a professional manner Network security personnel should run their activities as prescribed in the laws governing the field and specific organizational terms of agreement. It is recommended that, network designers propose up to date and secure network and monitor its implementation. While designing organizational network, network designers should confine their duties with international laws, specific state laws and organizational terms of agreements. As professionals, IT security personnel should demonstrate highest level of professionalism coupled with competence in service delivery [8]. Their execution of duties should prove to the client their ability to deliver accounting to the terms of agreement and clients need but within strict conformity of the law. When designing the network, IT network security team should not create loopholes that they will come back to compromise as it has been witnessed in many organizational cases of data breach. Promote acceptable network security standards and current best practices To implement up to date and strong network, some standards must be met. When designing and implementing network security, applicable rules should be followed in order to come up with secure network. In this case, network security team should not come up with a network design that does not meet required operational threshold because enterprise client has requested it. It is commonly known that, some clients would not be willing to provide required tools and resources to set up to date network. In contrast, when network and data breach happens, all complaints are directed to the network designers and implementation team [13]. To avoid unnecessary complaints, network security team should recommend network that is within international set standards. Where clients are not willing to provide required resources to help in setting up to date network, contract should be terminated [7]. Since organizations transact with other organization, failing to meet required network threshold standards e xposes other organizational networks to threats. Uphold data confidentiality and secrecy of information encountered while on duty Network security professionals interact with organizational sensitive data that should not be exposed to external entities. Since IT network personnel must interact with such information while setting up organizational network, they should be should be held responsible in case such information is lost. Due to fear of losing information to competitors, organizations and international bodies should come up with rules that restrict IT network security teams from exposing or using such information for personal gains [3]. When working for an organization, they are bound by the laws of the specific organization and international rules of information confidentiality and secrecy. IT network security team should be aware that any information exposed to them is to help them to execute their duties diligently and honest must prevail at all times while on duty. Secure Wireless network design Organizational activities have moved online due to the need to diversify its operations. With many organizations establishing braches worldwide, communication has become quite essential and this has necessitated the need for wireless network [15]. Important to note is that, as much as wireless network is important, it has security issues which should be considered when being set up in an organization. To address wireless security issues, various aspects should be considered ranging from design of the proposed network, devices to be used in the design, the nature of security to be implemented and number of network users in order to determine the bandwidth [10]. All these network security aspect should be set geared towards maintaining required network authentication, authorization, maintaining organizational data integrity and preventing organizational data from eavesdropping while being transmitted from various terminals to central servers. The network would be operating in regard to various stages that are set out for connection. First, every device within the organizational network would be required to connect to the wireless network through Radius server authentication and its protection be strengthen throughWPA2. Device connection to the wireless will be evaluated if it is being made from general staff or administration network subnet. Connection terminal from general staff subnet would not be able to view activities from administrative subnet [17]. This would be achieved through implementation of Radius server security to subnet the network. On the other hand, administration would be able to view activities from general staff but would have no privileges to change any data. Device connection procedure should follow the given steps Search for wireless network signal while within organization Once detected, device would get required certificate to make connections Enter login required credentials to make connections to the network Device gets connected and network system records authentication logs and encrypts them Data authorization Organizational data is quite sensitive and not all users should be allowed to access such information. A certain group of users with specific operations should be granted necessary but limited operations on the data. Since most of this data is accessed online through wireless network through dump terminals, network should be segmented in to various subnets according to data access needs [5]. To delete or alter any data from organizational system, employees should be granted privileges and prove authenticity of making such changes. To perform any change o data through wireless access, network system should approve the user through use of radius passwords before gaining access. Radius server defines extend of the network in the organization because some of the networks might extend beyond organizational boundaries and get used by third parties to harm organization or perform malicious activities. Similarly, once wireless boundaries are set, access credentials is the next important that must be considered. This is usually used to define the nature of authentication to be used. After log in credentials are approved, connecting devices would be assigned one-time encryption key. Additionally, Wireless Application Protocol (WPA2) should be implemented in the security purposes. It is regarded as the modern secure means of securing organizational network due to its improved encryption standards [1]. To access the network, user should be provided with very strong password that provides authorization to the network. Authentication Wireless network should not be set free for any user due to security concerns. Both new users and existing users should prove they are genuine users of the network any time they need to do use it. In case of new users of the organizational network, their connection terminals must be verified to be true user of the network [14]. To make sure network is secure, organizational wireless network should be protected with very strong passwords and new connection terminal must be authenticated by approved organizational network administrator. To be authenticated, network user must agree and sign terms of agreements that abides any organizational network user. Once authentication to the organizational network has been approved, access to the organizational data should be limited through assigned privileges [9]. To get this done in an efficient and secure manner, the following aspects can be implemented. First, use of radius server is quite appropriate measure as it provides security to the ne twork through several aspects. In this case, radius server provides security to organizational network through use of connection certificates to approve the device that connects to the network. Once connecting device is granted connection certificate, wireless access credentials are required to access the networks and radius server authentication process ends by writing off connection logs to the network [18]. Since organizational networks are protected with secure passwords, it is important for users to be granted essential privileges. Protection may be either logical or physical. In this case, WAP2 provides logical authentication where passwords are required in order to access organizational network and sensitive data. Network integrity Wireless network should meet all required operational standards. Network operation procedures helps in determining the quality of network to be provided and how its operations should be maintained in line with organizational policies of operation [4]. To make sure wireless network integrity is upheld, specific rules of operations should be set. Through of radius server, wireless network integrity clearly defines on how to access the subject network, required parameters and the nature of the parameter to access the network and security proofs of connecting to the network. Therefore, if prescribed parameters and procedures are provided in the right manner, wireless network integrity would be met and security of the network would be guaranteed. Additionally, WPA2 protection provides rules that are to be met by organization in order to access organizational wireless network [12]. The predefined rules are usually set by manufacturer and it the responsibility of the network designer to sel ect rules that specific organization should implement. Network eavesdropping prevention Network eavesdropping on wireless network takes place mainly when data is on transmission. To prevent data eavesdropping by unauthorized users while transit, several measures should be taken by network administrators [6]. Since almost every network user and third party user would try to compromise and access data on transit. Through use of radius server, security can be provided by implementing strong authentication and authorization measures provided to help in securing organizational wireless network. By using strong passwords and certificates provided during first time access to the network, internal user would not be able to listen to data while within organizational network. Similarly, in cases where organization shares wireless network with its neighboring branches, data transmission over the network should be secured with strong keys. This marketing accessed data unusable because hackers would not have decryption key [16]. Additionally, to prevent eavesdropping, WPA2 provides data encryption mechanisms that are not simple to bypass. Implementing secure organizational wireless network It is the desire of every organization to operate on a safe environment that is free of attacker. Having implemented wireless network in organizations, network security is of paramount and should be enforced through various measures. In this case, network security has been implemented through use of Radius server and Wireless Application protocol (WPA2) [15]. Wireless Application Protocol (WPA2) WPA2 is considered to be one of the modern secure networks in current technology world. Implementing it on the organizational operations, it would guarantee security of network. The following steps would be used in setting up wireless network through use of WPA2. Before setting up of the wireless, it would be recommended to create a database of network users The database can be set up in the same machine or a different one through use of MSQL or MariaDB. Choose and set up network encryption keys to be used in securing the network Create relevant client connections of who might be using the network Client connects to the network by providing required details as the network server saves for future use Once connected, network router would be set up to provide required business integrity rules Limit connection rules to enhance business integrity of the wireless network Before sending data, it should be encrypted to make sure it is free from interruption Radius server security implementation Create database to capture users of the network Grant operational certificates to users of the network Provide required permissions to relevant network users of the network Access the network for organizational business activities Record one time log and encrypt it with secure protection key Each tie user requires access to the network, should be prompted to enter login credentials to ascertain the authenticity of the user Conclusion When designing and implementing organizational network, security should be given highest priority. Designing and implementing network should be guided by ethical principles as well as adhere to international standards. Some of the principles that should guide international network designers are; execution of duties diligently and in an honest manner. Similarly, network designers should provide required network recommendations and be guided by principle of designing current and up to date network. Finally, network security teams should uphold confidentiality and secrecy of information as required by law. During design and implementation of secure wireless network, principles of integrity, authentication, authorization and prevention of data loss through eavesdropping should be met. As all network design principles are implemented, there actualization should put in to practices both Wireless Application protocols (WPA2) and Radius server. References Bicakci, K., Tavli, B. (2009). Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards Interfaces, 31(5), 931-941. Cardenas, A. A., Roosta, T., Sastry, S. (2009). Rethinking security management, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad Hoc Networks, 7(8), 1434-1447. Chen, Z., Liu, A., Li, Z., Choi, Y. J., Sekiya, H., Li, J. (2017). Energy-efficient broadcasting scheme for smart industrial wireless sensor networks. Mobile Information Systems, 2017. Chilamkurti, N. (2013). Security, design, and architecture for broadband and wireless network technologies. Hershey, PA: Information Science Reference. Das, S. K., Kant, K., Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure: Foundation and challenges. Waltham, MA: Morgan Kaufmann. Doherty, J. (2016). Wireless and mobile device security. Burlington, MA: Jones Bartlett Learning. Fadyushin, V., Popov, A. (2016). Building a pentesting lab for wireless networks: Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques. Geier, J. T., Geier, J. T. (2015). Designing and deploying 802.11 wireless networks: A practical guide to implementing 802.11n and 802.11ac wireless networks for enterprise-based applications. Holt, A., Huang, C.-Y. (2010). 802.11 wireless networks: Security and analysis. London: Springer. Hossain, E., Chow, G., Leung, V. C., McLeod, R. D., Mii?, J., Wong, V. W., Yang, O. (2010). Vehicular telematics over heterogeneous wireless networks: A survey. Computer Communications, 33(7), 775-793. Levy, J. (2008). SonicWALL secure wireless network: Integrated solutions guide. Burlington, Mass: Syngress. Li, S., Xu, L. D., Romdhani, I. (2017). Securing the internet of things. Lloret, J., Bosch, I., Sendra, S., Serrano, A. (2011). A wireless sensor network for vineyard monitoring that uses image processing. Sensors, 11(6), 6165-6196. Ramachandran, V., Buchanan, C. (2015). Kali Linux wireless penetration testing: Master wireless testing techniques to survey and attack wireless networks with Kali Linux. Raths, D. (2012). Are you ready for BYOD: Advice from the trenches on how to prepare your wireless network for the Bring-Your-Own-Device movement? THE Journal (Technological Horizons in Education), 39(4), 28. Usman, A., Shami, S. H. (2013). Evolution of communication technologies for smart grid applications. Renewable and Sustainable Energy Reviews, 19, 191-199. Ventrone, J., Hollis, A. (2016). From the Air Force to college: Transitioning from the service to higher education. Wrightson, T. (2012). Wireless network security: A beginner's guide. New York: McGraw-Hill.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.