Assignment_4_whudso21

docx

School

Kennesaw State University *

*We aren’t endorsed by this school

Course

7220

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by BaronKnowledge10070

Report
William Hudson CYBR7220 Assignment 4 Identify a software tool or smart phone app that can analyze wireless network. Include the name of the tool, operating environment and its basic features. The tool I chose was the Android App “Fing”. It is a network analysis app that shows you the security of the network, a list of the devices on the network, ISP detection, speed test capabilities, light administration tools (ping, tracert), and security tools, which are locked behind a paid version. Use the select tool to analyze the wireless connection/traffics during your operation. The network could be at your home, workplace, coffee shop, etc. Please select two networks for your assignment. Include at least following information about each wireless LAN: name (SSID), security protocol used, placement of AP and signal strength on three spots. The first network I connected to and analyzed had the following information: SSID: Family Y Guest Wifi Security Protocol: OPEN (no security) Placement of AP: Several devices on the ceiling appearing to be in a mesh configuration. Signal Strength: Location 1: -55dBm; Location 2: -2147836848 dBm; Location 3: -74 dBm The second network I connected to and analyzed had the following information: SSID: HudsonHome Security Protocol: WPA/WPA2-Personal Placement of AP: 2 APs: One upstairs in front of house, one downstairs in rear of house Signal Strength: Location 1: -45dBm; Location 2: -51 dBm; Location 3: -42 dBm For each network, write one paragraph analysis on its security setting and recommendations to make it more secure. For the Family Y Guest Wifi network, I would turn on WPA2 encryption and provide a password to connect to the network. As it is currently configured, anyone with Wireshark or other sniffing tool could capture packets and analyze them since all communication is transmitted in plain- text. Another way to secure the network would be to use a captive portal to create a guest VLAN that would not be able to reach across to the main network. Guests would be segmented, their bandwidth could be limited, and their site access could be restricted For my HudsonHome network, the FING tool alerted me to a large number of unidentified devices on the network. Most of these devices are my IoT devices and end devices such as laptops and phones, but they are not configured to display a human-readable name to identify them. I could organize and identify the devices and their MAC addresses and filter connections to my network based on known good MACs. Another thing I could do is to add a guest network
William Hudson CYBR7220 Assignment 4 that would behave similarly to a public wifi network: it would be segregated away from the main network, bandwidth would be limited to ensure high quality of service on the main network, and site access could be restricted based on content.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help