Daniel Nkansah C844 TASK 2
docx
keyboard_arrow_up
School
Western Governors University *
*We aren’t endorsed by this school
Course
C844
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by MegaFox4009
1
Nkansah Daniel Nkansah
Emerging Technologies in Cybersecurity - C844
Professor Alan Bringardner
November 17, 2023
A.
1. One of the obvious points of vulnerability is the access point that provides service to the employee patio area. When a wireless signal travels outside a building, it leaves the WLAN vulnerable to security lapses like wardriving, which is the act of using a laptop or smartphone to look for Wi-Fi networks while driving. If the wireless network is not properly setup or set up, attackers may be able to take advantage of this vulnerability to enter the WLAN and access the company's network without any limitations.
2. I found another weakness in the WLAN, which is related to the 100-mile-distance data center. It's not the distance per such that's the issue, but rather how staff members are connecting to the server. Since there isn't a VPN connection set up for now, data transfer between the staff and the server isn't encrypted. Because of this, any data that moves between them could be stolen or compromised by an attacker, which is why setting up a VPN tunnel is essential for connection security and defense against man-in-the-middle attacks.
B.
1. The first security risk associated with staff members using mobile devices comes from the five
account reps who each had a laptop, tablet, and smartphone, for a total of 15 devices that will be
2
Nkansah able to connect to public Wi-Fi. Since sensitive data won't be sufficiently protected, the organization runs a serious risk if these devices don't have the necessary VPN or encryption in place.
2. The second weakness is that the 15 devices are very prone to loss or theft. Because the data is unprotected, anyone who finds these devices may be able to access confidential information belonging to the organization.
C
1. The organization needs to make sure that all wireless connections use the WPA2 AES protocol, which is generally considered to be the most secure wireless protocol, in order to solve the access point issue in the employee patio area. As an alternative, the business can think about putting the IEEE's 802.1x authentication protocol into place, which is a recognized industry standard for port-based network access control.
2. To solve the issue of web servers being situated 100 miles distant, the business had to set up a VPN between the data center and the Alliah office. By taking this step, data encryption will be guaranteed for increased security.
3. The organization needs to deploy VPN software on each of its mobile devices to guarantee security and address the first vulnerability of mobile devices. All traffic to and from those devices will be encrypted, thanks to this step.
3
Nkansah 4. It is advisable to build up a mobile device management (MDM) system, which would enable the remote management of all such devices, in order to address the susceptibility of the company's mobile devices. Any device that is lost or stolen could be locked or erased by the IT department with the implementation of an MDM. By doing this, the sensitive data of the company would be effectively protected.
D
As Alliah develops further and prepares to go public in a few years, my focus will be on PCI/DSS preventive measures. PCI compliance guidelines (Thebalancesmb.com, 2021) state that
we can abide by rules by using MFA and high-level security passwords instead of default ones. Before being able to access the system, users of MFA must meet certain requirements, including as being, knowing, and holding something. Therefore, in addition to their username and password, users must also utilize biometrics or a passphrase from an authentication system. This ensures that consumer data is stored on a more secure system.
The second security precaution we plan to put in place has to do with PCI/DSS. In accordance with PCI compliance guidelines, we must use and update anti-virus software on a regular basis. As a result, we have concluded that Alliah Company needs to put antivirus software on the server
to facilitate software management and guarantee that all systems connected to the server receive routine maintenance and updates.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Nkansah E
TheBalanceCareers.com claims that since BYOD eliminates the need for employers to buy phones and laptops for each employee, businesses can save a lot of money. Employees are also more likely to upgrade to the newest technology and to take better care of their devices because they own them. But in order for a BYOD strategy to be successfully implemented, the business needs to have a thorough policy or checklist that covers things like eligibility requirements, device specs, acceptable use, device maintenance, and loss prevention. The policy should be explicit and unequivocal, outlining who oversees updating and replacing equipment and mandating that VPN software and password-protected or biometric access be installed on all devices. The organization should also mandate software updates and automatic security to ensure
device security. NIST SP 800-114, User's Guide to Telework and Bring Your Own Device (BYOD), should also be consulted.
5
Nkansah References
Lucas, Suzanne. “The Pros and Cons of a Bring Your Own Device (BYOD) to Work Policy.” LiveAbout
, LiveAbout, 17 Sept. 2020, www.thebalancecareers.com/bring-your-own-
device-byod-job-policy-4139870. Glover, Yvette. “What Is PCI Compliance?” LiveAbout
, LiveAbout, 11 Aug. 2021, www.thebalancesmb.com/what-is-pci-compliance-5197171#:~:text=PCI%20compliance
%20is%20adherence%20to%20a%20set%20of,brands%20and%20merchants%20are
%20responsible%20for%20enforcing%20compliance.
Souppaya, Murugiah, and Karen Scarfone. User’s Guide to Telework and Bring Your Own Device (BYOD) Security - NIST
. nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf.