Free Essay

Itt It220 Lab 5

In:

Submitted By KramerBones
Words 353
Pages 2
40.) 802.11b: NETGEAR ANT24O5 5dBi Omni-Directional 802.11 22.99 http://www.compuplus.com/ D-Link ANT24-0600 - Antenna - 802.11 b/g - indoor - 6 dBi – directional 14.99 http://www.amazon.com/D-Link-ANT24-0600-Antenna-802-11-directional/dp/B00064AW62

802.11a:
TRENDNET TEW-AI75OB DUAL-BAND 802.11A/G 7/5DBI ANTENNA (TEWAI75OB) 23.65

http://www.beachaudio.com/Trendware/Tew-Ai75ob-p-89924.html?utm_source=froogle&utm_medium=cpc&utm_campaign=tew-ai75ob&utm_content=atr

Outdoor Pannel Antenna 23DBI 802.11A Directional 152.00

http://www.amazon.com/Outdoor-Pannel-Antenna-802-11A-Directional/dp/B0016HM8VA

802.11g:
PROSAFE™ 9 DBI OMNI-DIRECTIONAL ANTENNA ANT2409 129.99

http://www.netgear.com/products/business/access-points-wireless-controllers/antennas-cables/ANT2409.aspx
Sewell Part #: SW-6130 Mfg Part #: TEW-OA24D 164.95 http://sewelldirect.com/trendnet-802-11g-wireless-WLAN-24dBi-outdoor-antenna.asp?source=froogle&utm_source=Froogle&utm_medium=cse&cvsfa=1306&cvsfe=2&cvsfhu=53572d36313330 802.11n:

CP TECH OAN-2151 Omni-directional Antenna $64.24

http://www.buy.com/prod/cp-tech-oan-2151-omni-directional-antenna-15-dbi-n-type/q/loc/101/210878384.html

Netgear ProSafe ANT224D10 2X2 Indoor/Outdoor 10 dBi Directional Antenna, RoHS Compliant, P/N: ANT224D10-10000S. $230

http://www.axiontech.com/prdt.php?item=90457 41.) I would look around and see what other wireless devices, cordless phones, Bluetooth devices and the such to see what would be causing the interference. I would utilize a wi-fi analyzer application to determine where the signal strength is best and relocate the access point or move the interfering device if possible.
42.) Dear Supervisor: Utilizing a secured wireless network with EAP protocol is definitely a way to seriously reduce unauthorized access to the network, it is still not enough. There are many programs out there designed to sniff out networks, then decrypt their passwords. By utilizing encryption software running on the server and the clients, even if data is captured from the airwaves, they will still not be able to read the data because they do not have the proper decryption code.

Similar Documents

Premium Essay

Seeking Help

...confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17