3
Logan Shirling 3/19/15 ch. 7 end of chapter questions Essay Hello friend, This is logan I have been informed that you are considering installing a wireless Lan or WLan at the location of your small business. I also understand that you have some concerns about the security threats you may face and how you can reduce these threats. When installing a wireless Lan there are two main security risks that should be considered. These are Denial of service attacks also known as Dos attacks, and then there are evil twins. The first that I will cover is the Denial of service attacks. in a usual denial of service attack, the attacker or attackers overload an access point or cause other clients to

ch.7eoc

  • Upload
    logan

  • View
    214

  • Download
    2

Embed Size (px)

DESCRIPTION

chapter 7 assignment from networking

Citation preview

Logan Shirling3/19/15ch. 7 end of chapter questions

Essay

Hello friend,

This is logan I have been informed that you are considering installing a wireless Lan or WLan at the location of your small business. I also understand that you have some concerns about the security threats you may face and how you can reduce these threats.When installing a wireless Lan there are two main security risks that should be considered. These are Denial of service attacks also known as Dos attacks, and then there are evil twins.The first that I will cover is the Denial of service attacks. in a usual denial of service attack, the attacker or attackers overload an access point or cause other clients to disassociate from the access point. One means by which an attacker may decide to do this is to flood an access point with traffic. this is usually done with frames that request association or something else that requires a relatively large amount of processing power. Denial of service attacks are uncommon and are usually unsuccessful but you still need to plan for them.The second type of security threat that i will cover is the evil twin access points. an evil twin access point is a notebook computer configured to act like a real access point. this causes clients to associate with it and allow it to intercept packets from the clients and read them before they are sent along the line. this type of attack is also known as a man in the middle attack. evil twin access points are very hard to avoid, but the most common mean by getting around them are using vpns. while using a vpn the evil twin access point is still present and collects data, but is unable to read it because the data is encrypted so that the real access point and the client can understand it.In conclusion friend i advise you to be careful and set up your wireless lan to be able to deal with evil twin access points and denial of service attacks.

-best of luck, logan.perspective questions1. the most surprising thing i learned this chapter was the incredible detail that is needed to maintain and operate a wireless network.2. the most difficult part of this chapter is by far the vocabulary.