Wireless Devices

Wireless devices such as smartphones can increase the attack surface of an organization. This risk has become more severe as the cellular networks gain popularity as a route to the internet. Data being transferred between a device and an access point or cellular base station is vulnerable. Also, on many devices, apps have the ability to talk to each other. For this reason, organizations implement controls such as Mobile Device Management (MDM), even on personal devices when used for business. This can sometimes restrict what an employee is able to do with their device. Does the flexibility and convenience of a personal mobile device justify the risk and exposure, or are the restrictions in line with risk exposure? Share your thoughts and experience.

This is a discussion Questions Assignment Answer the above prompt and Respond Separately to the Paragraphs below

1
Discussion 6
COLLAPSE
Hi, class. Interestingly, one of the first recorded attacks on a wireless system was in the early 1900s, with long-distance radio transmission by Nevil Maskelyne. An inventor who was interested in wireless systems. Reading this chapter also made me take some safety measures on my wireless devices. For example, I researched and set up my Digital secure protection plan through Verizon Wireless. With web security, I block suspicious websites and links that can put my info at risk. Wi-Fi security instantly lets me know when my Wi-Fi network might be unsafe or unprotected. The plan also comes with a personalized VPN that encrypts signals from the network from Wi-Fi so that it will not get encrypted by hackers. The VPN protects my online privacy by creating a source connection between the Internet and me. It also helps protect against bluesnarfing to hide my IP address, physical location, online activity, and browser history. It also provides a system scan for variabilities and protected and unprotected networks in dark web search activity that monitors emails and breach addresses.
An organization’s wireless devices can be at risk by rogue AP and evil twin attacks on an enterprise network, further creating a blurred edge to a corporate network. If I oversaw wireless network security, I would choose security over convenience by controlling which devices are permitted to join the network and determining whether to use waitlisting or blacklisting and protocols. Along with ( IEEE 802.11i standards and WPA3 maintaining authorizations. Using the Wi-Fi analyzer tool helps visualize the wireless network’s essential details. An analyzer can provide information such as signal strength, network health, channel bandwidth, channel coverage, data rate, and interference (noise). Lastly, limited wireless access should be in place for employees and customers using wireless devices. When accessing protected data, permission must be granted, or employees must report to a protected network.

.

2
Discussion Question 6
COLLAPSE
The use of cell phones along with other personal devices to access the corporate network is an issue. Many organizations require an MDM for the cell devices, but some are a little laxer in their security of these devices. The use of VPN and MFA helps protect the users access to the corporate network but does not ensure that confidential information that is accessed from that the device is encrypted or deleted after use. They also do not ensure the security of the cell device itself. Many MDM’s require security settings such as pin or biometrics to login the mobile devices themselves, restrict use of certain applications, require antivirus and potentially creating a secure container for the work environment on the cellular device. For some organizations, MDM is too intrusive to require on a someone’s personal device. For K-12 education for instance, this would be a significant cultural change. Our users are not only the staff, but the students and their parents. If an MDM is not an option, you should put as many controls around the access to confidential information as possible, to include user policies and educating the users on the risks of accessing sensitive information and their responsibility in that.

Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.

Quality Guaranteed

Any Deadline

No Plagiarism