IT 241 Week 8 Wireless Security

IT 241 Week 8 Wireless Security

The old adage "Where there's a will, there's a way" holds true in the world of wireless technologies. If a person has the will to break into your network, he or she will attempt to do so in every possible way. This assignment provides an opportunity for you to explore the various vulnerabilities of wireless networks.  Resource: Appendix G, Ch. 11, 13, & 14 of CWNA Certified Wireless Network Administrator Official Study Guide  Address the following questions in 1 page:Some attackers intend to cause harm to the network they are attacking, while others do not have a malicious intent. Of the following six categories of attackers, which category would you want to break into your network? Why?
Hackers
Crackers
Script kiddies
Spies
Employees
Cyberterrorists
Of the three categories of wireless security protection (MAC filtering, WEP, and authentication) discussed in the "Legacy 802.11 Security" section in Ch. 13 of CWNA Certified Wireless Network Administrator Official Study Guide, which do you think is the most secure? Why?
Complete Appendix G. Support your responses with citations and references in APA format. Post your response to the questions with Appendix G as a Microsoft® Word attachment.