CSSS-5220 Week 6 Assignment

docx

School

Webster University *

*We aren’t endorsed by this school

Course

5220

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

6

Uploaded by UltraKingfisherMaster1083

Report
Week 6 Written Assignment: Assessment Wireless Security Manoj Kumar Madala Webster University CSSS – 5220 Cybersecurity Threat Detection Professor Jason Ham February 25, 2024
Wireless Security: Wireless security keeps wireless networks and gadgets safe from hackers and people who aren't supposed to be there. Wireless security is critical in today's digital age since the growth of linked gadgets has rendered networks increasingly susceptible to cybersecurity assaults. An unprotected wireless network poses many risks, including the compromising of sensitive information, theft of personal identities, and damage to computer systems. Encryption Strong Encryption Protocols: Be sure to use robust encryption techniques are the most current and safest choice is WPA3. If WPA3 cannot be accessed, WPA2 encrypted with AES will suffice. Stay away from networks that’re employing WEP encryption since it’s so broken. Enable Password Protection: Always connect to networks that need a password. Your data is entirely exposed on open Wi-Fi networks thus you should never connect to them. Authentication: Avoid Automatic Logins: Disable the function that connects your device instantly to known Wi-Fi networks to avoid automatic logins. This lessens the possibility of inadvertently joining fraudulent networks that seem like authentic ones. Use Strong Passwords: Protect your Wi-Fi networks using robust passwords. Each one should be different and difficult to guess. Stay away from using things like your name, birthdate, or terms that anybody can look up in a dictionary. A password manager may help you create and remember complex passwords. Virtual Private Networks:
VPN for added security: A VPN makes your internet data private by encrypting it, connecting your device to the VPN server through a safe path. Protecting your data from eavesdroppers is crucial, and this is particularly true while using public Wi-Fi networks. Pick a trustworthy VPN service: When choosing a VPN, look for one that has a solid reputation for protecting user data. The absence of logs, robust encryption techniques, and leak prevention are all desirable aspects to look for. Disabling SSID Broadcast: Your wireless network's name, abbreviated as SSID, provides critical information about it. Disabling SSID broadcast might help you prevent unintentionally exposing your network to prospective attackers who utilize a method known as wardriving. In wardriving, a sort of piggybacking, an attacker researches a public Wi-Fi hotspot and then configures their machine to mimic it. Identifying potentially dangerous networks and taking precautions to avoid connecting to them should be possible. Network security relies heavily on the ability to detect and stop hostile networks. Malicious networks are ones that try to exploit network flaws, steal data, or disrupt routine operations. Some measures you may take to detect and avoid harmful networks are as follows: Red Flags to watch out for: Unsecured Networks: Networks without password protection should be avoided. With these networks, all your data is left vulnerable. Suspicious Network Names: Names that closely match actual companies in the region or are generic, such as "Free Wi-Fi," should raise suspicions about a network. Any of these things could be efforts to trick you into joining a dangerous network. Connection Issues: Problems establishing or maintaining a connection to a network may
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
indicate malicious activity on the part of the network administrator. Network Security Warnings: Some devices may alert you when you try to connect to an unsecure or unknown network, which is a security risk. Listen to these cautions and stay away from the internet. Install Antivirus Software: Keeping antivirus software up to date with the newest definitions is essential for detecting and preventing infection from dangerous files. Create Strong Passwords: Strong passwords have eight characters or more and contain letters, numbers, and symbols. Protecting your network and devices from hackers requires strong passwords. Enforce Security Policies: You may outline the regulations and standards for accessing and using your network's resources with the aid of security policies. As an extra layer of security, multi-factor authentication allows you to request additional verification in addition to a password. Use Firewalls: Firewalls are pieces of software or hardware that check all network data coming in and going out based on rules that have already been set. A firewall is a tool that may help keep harmful or undesirable traffic out of your network. Monitor Activity: You can spot malware infections, phishing attempts, ransomware attacks, and distributed denial-of-service (DDoS) attacks by keeping an eye on network activity. Wireshark may be used to monitor network traffic and find indications of compromise (IOC) or frequency analysis. Protecting Yourself from Malicious Networks : Verify with trusted sources: If you're doubtful about a network's validity, ask the personnel for the official Wi-Fi network name and password.
Use a Wi-Fi scanner app: You might want to use apps that look for open ports, network encryption, and possible security holes. More information on the security of a network may be gleaned from this. Disable automatic connections: Stop your device from connecting to recognized Wi-Fi networks automatically by disabling this function. The likelihood of unintentionally connecting to harmful imposters is lowered as a result. Prioritize secure networks: Use networks that use strong WPA3 or WPA2 encryption with AES whenever feasible. Stay away from networks that use WEP encryption. Be cautious while using public Wi-Fi: Limit critical activities like online banking and financial data entry on public Wi-Fi networks. Here, a virtual private network (VPN) could be useful for extra protection.
References Baig, A. (2022, June 17). 12 Best Practices for Wireless Network Security . GlobalSign. https://www.globalsign.com/en/blog/12-best-practices-wireless-network-security CISA. (2020, September 24). Technical Approaches to Uncovering and Remediating Malicious Activity | CISA . Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/news- events/cybersecurity-advisories/aa20-245a dig8ital.com. (2024, February 22). Ensuring Wireless Network Security: Tips and Best Practices | dig8ital . Dig8ital.com. https://dig8ital.com/post/wireless-security-101/ EC-Council. (2022, March 24). Five Ways to Defend Against Network Security Threats . Cybersecurity Exchange. https://www.eccouncil.org/cybersecurity-exchange/network-security/how-to-prevent- network-security-attacks/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help