IT 241 Week 8 Wireless Security

IT 241 Entire Course Link 
https://uopcourses.com/category/it-241/



IT 241 Week 8 Wireless Security
The old adage "Where there's a will, there's a way" holds true in the world of wireless technologies. If a person has the will to break into your network, he or she will attempt to do so in every possible way. This assignment provides an opportunity for you to explore the various vulnerabilities of wireless networks.
 Resource: Appendix G, Ch. 11, 13, & 14 of CWNA Certified Wireless Network Administrator Official Study Guide
 Address the following questions in 1 page:

  • Some attackers intend to cause harm to the network they are attacking, while others do not have a malicious intent. Of the following six categories of attackers, which category would you want to break into your network? Why?



  • Hackers

  • Crackers

  • Script kiddies

  • Spies

  • Employees

  • Cyberterrorists



  • Of the three categories of wireless security protection (MAC filtering, WEP, and authentication) discussed in the "Legacy 802.11 Security" section in Ch. 13 of CWNA Certified Wireless Network Administrator Official Study Guide, which do you think is the most secure? Why?


Complete Appendix G. Support your responses with citations and references in APA format.
Post your response to the questions with Appendix G as a Microsoft® Word attachment.
Powered by