ITT 370 Passively Monitoring a Wireless Network

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

370

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by PeanutButterEater102

Report
Passively Monitoring a Wireless Network 1 ITT 370- Wireless Networks Passively Monitoring a Wireless Network
Passively Monitoring a Wireless Network 2 Part 1 The first step is to install Wireshark. My shortcut got deleted so I decided to download it again from class resources. Next I have to accept the license agreement: Click next on the next few screens (I chose to add a desktop and quick launch icon for easier access)
Passively Monitoring a Wireless Network 3 The device will need to reboot. I chose to do the reboot now option. Step 2 is to find a public, not secure Wi-Fi network to link my laptop to. Now that I have connected to a public not secure Wi-Fi I will attempt to visit some unsecured websites:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Passively Monitoring a Wireless Network 4 Next I logged into my secure at home Wi-Fi and went to only secure websites: Part 2 I then opened both the secure and unsecure captured packets and put them side by side.
Passively Monitoring a Wireless Network 5 1. What I noticed immediately was port 137 on the unsecure website capture is utilized by NetBIOS which means all my files and printer information. I also observed that there were significantly more packets delivered on the unsecure Wi-Fi and websites. I then analyzed a few of the highlighted red ones and noticed that they all came from the same SRC port (443). 2. While most wireless networks offer some sense of security, it is not possible for a network to defend against all attacks and threats. Some recommendations to add a layer of security include turning off vulnerable ports, enabling firewall rules, and clearly defining the right access points. Another good idea is to add encryption when dealing with sensitive data. 3. The WLAN would be the method that I would recommend limiting most out of that list since sensitive data is more susceptible to being leaked. While a WLAN may be easier to install and communicate with, the government can also limit the flow of signals with bandwidth and unauthorized users may be able to see the communications (Pulkitagarwal03pulkit, 2022) References Pulkitagarwal03pulkit. (2022, July 25). Advantages and disadvantages of WLAN. GeeksforGeeks. https://www.geeksforgeeks.org/advantages-and-disadvantages-of-wlan/