Free Essay

Protecting Wireless Devices and Enhancing Security in a Wireless Network

In:

Submitted By jeromescsx
Words 2804
Pages 12
In this ever changing world, wireless communications has become a major platform for communications at work and at home. With popular mediums (Cell phones, PDA’s, Gameboys, Wii, Netbooks, iPods, etc…) like wireless devices, there are many advantages and disadvantages in operating wirelessly. No matter how you feel about the advantages or disadvantages of the devices, they need to be protected, along with setting up some form of security. On the website Howstufworksvideo (12) they show you the basics on how to setup home Network Security. You can go there can see how it is done. Just a few years ago, (25 Sep 07) there were some so-called experts saying that there was no need to secure your wireless system. In an article, David Ramel alleges that the importance of wireless security is overhyped, that it's now trivial to secure wireless nets and that IT pros have far more serious security concerns they should be addressing -- while home users have little to lose even in the remote chance someone tries to breach their network. (3) This person was obviously living in a sheltered environment because identity theft and credit card theft was out of control then. Now he is saying don’t worry about protecting your network and to just hold on to your wallet; basically. Either he was very innocent or totally clueless and is eating humble pie about now. Here are a few disadvantages. A limited spectrum, war driving, interfering signals can be generated by other devices in the office environment, for example printers, microwave ovens and other electromechanical devices. Wireless is a public frequency network therefore its interface is highly risky because anyone can pick up your signal. No matter how your cut it, wireless is easier, more convenient and is here to stay, so you must protect is. Preston Gralla of Computerworld wrote an article on “How to protect your wireless network (1) on the same day at Ramel wrote his but they saw tings totally different. Preston stated that bad guys will target you like war drivers and hacker. There are more reasons to protect your network. “It may not just be malicious attackers who cause problems. If you don't change the defaults of your wireless network, a neighbor with the same router make and model might accidentally connect to your network, stealing your bandwidth or reconfiguring your router and network without your knowledge” (1) In another article he says if you are not protecting your wireless network, “you're playing Russian roulette -- and the chamber is loaded with multiple bullets”. How’s that for an example. One way to fight this is to. Control the wireless signal. Typically 802.11b WAP transmits up to about 300 feet. However, this range can be extended farther by a more sensitive antenna. By attaching a high gain external antenna to your WAP, you can get a farther signal out but this may expose you to war drivers and others outside your house. A directional antenna will transmit the signal in a particular direction, as appose to an omnidirectional antenna that usually comes built into most WAP. So, carefully selecting an antenna is important to control both the signal range and its direction to help protect it from outsiders. There are many ways to setup wireless security. But if you really want to set it up correctly, there are five basic principles of security design you must follow in order to ensure you are doing it correct. These five key security principles are Layering, Limiting, Diversity, Obscurity, and Simplicity. Each one has its own level of importance and it depends on how important your system is but if you follow these basic principles you should be secure. We will go over each principle and step to ensure your system gets the attention and level of security it needs. The first principle is Layering; wireless security should be created in layers. “Securing information and systems against the full spectrum of threats requires the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems. This is due to the highly interactive nature of the various systems and networks, and the fact that any single system cannot be adequately secured unless all interconnecting systems are also secured. By using multiple, overlapping protection approaches, the failure or circumvention of any individual protection approach will not leave the system unprotected. Through user training and awareness, well-crafted policies and procedures, and redundancy of protection mechanisms, layered protections enable effective protection of information technology for the purpose of achieving mission objectives.”(5) One of the most obvious ways of protecting your wireless devices is securing them in a safe place, away from thieves and accidental intruders. This is where a good background in physical helps. Physical security describes measures that are designed to deny access to unauthorized personnel (including attackers or even accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts.(6) Adding security guards may deter some thieves but not all in a bank. If they shoot the guards, the security cameras will not stop them either. They will have to climb over the counter to get to the register and by that time the alarm would have gone off by then. The vault is the main objective but few robbers made it in and out of the vault without getting caught. So most robbers stop at the register because it is too risky and time consuming to enter the vault. That is a good example of layering. Just substitute money for data and put the equipment in the vault and add extra guards for a firewall. But you should never set up your firewall to be your last point of protection. You should build your system as though the firewall will get compromised Limiting is another part of protecting your system. You should always limit access to information to reduce the chance of threat against the company’s most valuable asset, information. These some of the things you can do to make your system more secure. Only grant access to those who need it. Giving access to more than the people that need the data will open your system up for failure. They all should not just have a need to know but an actual task to do with the information. Using passwords is a form of limiting only authorized personnel on the system. Remember you are limiting access to some areas also to protect you r system. Password protecting Windows will keep most people out of your computer but it won’t stop them all. Some people can get into a password protected Windows computer in less than 2 minutes. You can password protect the whole computer by putting a password into your computer’s system settings. No, these aren’t Windows settings; these are your computer’s motherboard settings. For some systems, this may not work. Your system will need to have an option in its settings for password protection. If it isn’t there you can’t do it. Follow these steps to setup a system password, do the following: 1. When you boot your computer, look for instructions for running or entering setup. They are usually at the bottom of the screen. In most systems you press the delete key and it enters setup right after the memory test. Again, this is WAY before windows even starts running. 2. Now all these setup screens tend to be a little different. You’ll probably scroll through items using your tab, page up / page down, or arrow keys (sorry, no mouse support here). Look for something about system security or passwords and head there. 3. From here, there is probably some kind of password setup. Select it and you should be able to put in a password (probably with a confirmation password). 4. Finally, exit the system settings. There should either be some kind of menu item or you just hit the escape key. Either way, you’ll probably be asked if you wish to save the new settings, say yes. Your computer should re-boot and ask you for a password from now on. These are probably the most difficult types of passwords to get through. The only way I know of bypassing it is to clear the CMOS memory from the motherboard, and you would need the specs on the board to do it. (7) Next, you need to diversify. It’s similar to layering, in layering; each layer must be different so that the hacker would need a different tool or technique to go any farther. Using diverse layers of defense, means breaching one wireless security layer does not compromise the entire system. Most Wi-Fi access points and routers ship with a feature called hardware or MAC address filtering. This feature is normally turned "off" by the manufacturer, since it requires a little of effort to set up correctly. However, to increase the security of your Wi-Fi LAN (WLAN), strongly consider enabling and using MAC address filtering. With no MAC address filtering, every wireless client could join your Wi-Fi network if they know your SSID and your encryption keys. When MAC address filtering is enabled, however, the AP or router performs an extra check on a different parameter. The more checks that are performed on the network, the higher the chances of preventing network hacker from break-ins.
To set up MAC address filtering, the WLAN administrator will configure a list of clients that will have access to the network. First, acquire the MAC addresses of each client from its operating system or configuration utility. Then, they enter the addresses into the configuration screen of the wireless AP. Then, turn on the filtering option. After enabled, each time the wireless access point or router receives a request to join with the WLAN; it compares the MAC address to the administrator's list. Clients on the list authenticate as normal; clients not on the list are denied access to the WLAN. MAC addresses on wireless clients can't be changed as they are burned into the hardware. However, some wireless clients allow their MAC address to be "impersonated" or "spoofed" in software. It's certainly possible for a determined hacker to break into your WLAN by configuring their client to spoof one of your MAC addresses. Although MAC address filtering isn't bulletproof, still it remains a helpful additional layer of defense that improves overall Wi-Fi network security. (9) You can find the MAC address for your network adapters on your devices by following these steps: First Click Start and then Run > Type command and press Enter > Type ipconfig /all in the command prompt window and press Enter > Find the line labeled physical access address in the resulting information. That is the MAC address for that adapter. (8) “Security Through Obscurity (STO) is the belief that a system of any sort can be secure so long as nobody outside of its implementation group is allowed to find out anything about its internal mechanisms. Hiding account passwords in binary files or scripts with the presumption that "nobody will ever find it" is a prime case of STO. Security Through Obscurity is a philosophy favored by many bureaucratic agencies (military, governmental, and industrial), and it used to be a major method of providing "pseudosecurity" in computing systems. Another way to "hide" from hackers who use the more common 802.11b/g wireless technology is to go with 802.11a instead. Since it operates on a different frequency (the 5 GHz range, as opposed to the 2.4 GHz range in which b/g operate), NICs made for the more common wireless technologies won't pick up its signals. Yes, this is a type of "security through obscurity" but it's perfectly valid when used in conjunction with other security measures. After all, security through obscurity is exactly what we advocate when we tell people not to let others know their social security numbers, address and other identification information. The bad part about 802.11a, and one of the reasons it's not as popular as b/g, is that the range is shorter in distance than b/g. It also has difficulty penetrating walls and obstacles. From a security standpoint, this "disadvantage" is actually an advantage, as it makes it more difficult for a hacker to intercept the signal even with equipment designed for the technology. Its usefulness has declined in the computing world with the rise of open systems, networking, greater understanding of programming techniques, as well as the increase in computing power available to the average person. The basis of STO has always been to run your system on a "need to know" basis. If a person doesn't know how to do something which could impact system security, then s/he isn't dangerous. Admittedly, this is sound in theory, but it can tie you into trusting a small group of people for as long as they live. If your employees get an offer of better pay from somewhere else, the knowledge goes with them, whether the knowledge is replaceable or not. Once the secret gets out, that is the end of your security.
Nowadays there is also a greater need for the ordinary user to know details of how your system works than ever before, and STO falls down as a result. Many users today have advanced knowledge of how their operating system works, and because of their experience will be able to guess at the bits of knowledge that they didn't "need to know". This bypasses the whole basis of STO, and makes your security useless.
Hence there is now a need is to create systems which attempt to be algorithmically secure (Kerberos, Secure RPC), rather than just philosophically secure. So long as your starting criteria can be met, your system is LOGICALLY secure.
"Shadow Passwords" are sometimes dismissed as STO, but this is incorrect, since (strictly) STO depends on restricting access to an algorithm or technique, whereas shadow passwords provide security by restricting access to vital data.”(10) While trying to fool the hackers and making your network as secure as possible there is one problem that all of this cause and can make all your other attempts fail. That is making the system so complex that the people working on it are so confused that they can’t use the system or bypass all of your security just to do their job and opening up the system for hackers waiting to take off your system. There needs to be a medium that all employees can follow. In a word “Simplicity”, Sometimes the must simplest things are the most secure when they are followed. Protecting a system from many forms of attacks require complex configuration but it can’t be confusing to the people that operates the system. So the challenge is to make your system complex and also possible to break-in and at the same time make it simple enough to be operated from the inside. One way to do it is by using firewalls. Wikipedia defines firewall as a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. (11) You can use multiple firewalls to protect your network. The Firewall is rules based meaning you have to give it a set of instructions to follow when it receive packets from the internet. It will allow, block or prompt you to do something. There are different types of packets, Stateless packets looks at the incoming packets to allow or deny access based on the instructions or rules you gave it. Stateful packets keep a record of the state of a connection between an internal computer and an external server. With that information it can determine whether or not to give it access base on the rules you gave it. While the infrastructure is doing all the complex work, the users don’t have to concern themselves with it. With recurring training and awareness briefings, you can have a complex system that is simple to operate. These are the ways you can use to setup security for your wireless network. You can use some or all of the examples given in the paper but remember your system is as secure as its weakest link. If the system is too complex to operate you may be wasting your money, time and effort. And always remember that the importance of the information you are protecting should match the security measures you are taking to protect it but you should use something no matter what the information is.

Similar Documents

Free Essay

Wireless Lan Security

...ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use. Other devices that...

Words: 4933 - Pages: 20

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Hjdfjjsfj

...I. Introduction: Wireless Local Area Network (WLAN) is the linking of two or more computers without using wires. WLAN makes use of the spread spectrum technology based on radio waves to enable communication between two devices in a limited area. Wireless local area networks (WLANs) based on the Wi-Fi (wireless fidelity) standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They are reported to reduce setting up costs by 15%. But, with these benefits come the security concerns. WLANs have very little security. An attacker can listen to you, take control of your laptops/desktops and forge him to be you. He can cancel your orders, make changes into your databases, or empty your credit cards. a. The 802.11 Wireless LAN Standard: In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports...

Words: 2926 - Pages: 12

Free Essay

Rim Corporatin

...manufacturer of BlackBerry wireless and e-mail services for the worldwide mobile communications market. RIM was founded in 1984 in Waterloo, Ontario, Canada by Mike Lazaridis and Douglas Fregin. With the development of integrated hardware, software and services, it provides platforms and solutions for all-in-one access to information, including e-mail, voice, browsing, instant messaging, short message service (SMS), Internet and intranet-based applications. It’s selection of products, services, and embedded technologies are used by thousands of organizations and millions of consumers around the world including the BlackBerry wireless solution, and the RIM Wireless handheld product line. RIM is also known as the inventor of the smartphones for business and government corporations. Some of the challenges that RIM face included Glenayre Technologies Inc. In August of 1991 Glenayre Technologies Inc. filed a patent infringement suit against RIM, regarding a patented process involving power generation from a dual battery source. Protecting intellectual property is one of the major security concerns of a company. There are many ways to implement the policy like blocking video camera of employee’s phones and ask them to register their phones. To be able to protect its intellectual property, RIM records all employee conversations using its domain. According to Robin Beinfait, former Chief Information Officer, RIM employees allow using the company beta devices as testers and users. However...

Words: 935 - Pages: 4

Free Essay

Can Research Rescue the Red Cross

...Headquartered in Oakton, VA, AT&T Government Solutions is a long-standing, trusted source of information technology solutions for the federal government, integrating unmatched network resources and IT managed solutions expertise with innovative technologies from AT&T Labs and a complementary team of industry-leading technology companies. Best known for network leadership in voice, data, video, and managed services, AT&T is a proven solutions integrator, with professional service expertise in enterprise architecture, business transformation, knowledge management, training, program management, systems engineering and security. More than 4,000 scientists, engineers and analysts – many with security clearances – focus exclusively on the IT requirements of government, with support from tens of thousands of professionals throughout the AT&T family of companies. Externally evaluated as a Software Engineering Institute - Capability Maturity Model Integration (SEI-CMMI) Level-3 organization and an International Organization for Standardization (ISO) 9001:2008, AT&T has the proven processes and procedures in place to deliver on time, on budget, with quality service. 1. Leadership Enterprise Management solutions from AT&T are designed to optimize the efficiency and availability of network services and mission applications. Enterprise Management process tools, implemented throughout your IT organization, can help your agency: * Increase automation to reduce...

Words: 3651 - Pages: 15

Premium Essay

Kudler Fine Foods Network Design Project

...Kudler Fine Foods Network Design Project NTC 362 March 17, 2014 Introduction This paper will present the Final Integrative Network Design outlining the cumulative plan that Kudler Fine Foods has accepted and agreed on for implementation of the following: Final Network Design The integrative network design project for Kudler Fine Foods will include Transmission Control Protocol/ Internet Protocol (TCP/IP) will be used as a means of communication within a private network or the internet for Kudler Fine Foods network devices. Hypertext Transfer Protocol (HTTP) is used for transfer of multimedia files, video, sound, and text over the internet. Kudler Fine Foods will implement File Transfer Protocol (FTP) to download files, transfer files, delete files, copy and rename files from the internet as needed. Mesh Protocol will be used to connect all devices such as printers, computers, and scanners on the network. In a true mesh topology every node has a connection to every other node in the network ("Common Physical Network Topologies ", 2014).   The network will consist of a hardware firewall blocking unwanted access from outside of the location. The next step is to set up a hub or switch that will connect all of the stores terminals. All of these terminals such as registers and remote locations such as warehouse will be hardwired with twisted pair CAT 5 Ethernet cable. The server will be located in a room in each store with the hub or switch. A wireless access point/router...

Words: 4817 - Pages: 20

Premium Essay

Information Technology

...Information Technology deals with the use of computers and telecommunications to store, retrieve and transmit information. New IT capabilities (e.g., e-commerce and social networks) strongly influence competitive strategies and the efficiency of operations. New IT developments are important to all business disciplines because they trigger changes in marketing, operations, e-commerce, logistics, human resources, finance, accounting, and relationships with customers and business partners. Nothing about business or corporate strategy is untouched by IT. Information technology is used in a wide variety of business organizations like Wal-Mart, Galeries Lafayette. The IT has also been applied to optimize police departments’ performance to reduce crime. The following points illustrate the use of IT to optimize police departments’ performance to reduce crime.     • It stores the data of the previous crimes in a single location for easy access. Whereas with street patrolling accessing of data regarding previous crimes takes some extra efforts as the data is not in a single location.     • We can apply certain logics and calculations on the collected data to come up with some predictions. With street patrolling, based on the previous data and experience we come up with some predictions     • The output of such a prediction is a report that gives the location and time of   where the crime will occur. With street patrolling no such reports are available and the prediction is made on...

Words: 10995 - Pages: 44

Premium Essay

Security Breach at Tjx

...Overview This case analysis report is about the IT security problems that Owen Richel, the Chief Security Officer of TJX should consider to improve by analyzing some security issues that TJX had faced during the 2005-2007 database intrusion. As technology advances, companies are facing some challenges regarding information privacy. “Information privacy concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when, and to what extent, information about them is communicated to others.” (Lecture notes) One of the privacy problems includes unauthorized access, which violates the laws and company’s policies, can limit a person to access to his/her personal information, and threaten the company’s legitimacy in its interactions with its stakeholders. In this case, TJX experienced an information security breach, caused over 94 million of payment cards at risk, and paid $158 million for damages and losses. This serious problem was recognized by Owen and thus case discussion is carried out as follows. Stakeholders & Preferences Some of the important stakeholders are customers, financial institutions, vendors and distributors, shareholders, and the management and employees. The most important stakeholder is the customers that TJX has been long serving with because they are the very first group of people who were affected by the intrusion. It was the customers’ debit and credit cards information that were stolen which...

Words: 1948 - Pages: 8

Free Essay

Riordan

...MANUFACTURING PHYSICAL LAYOUT AND NETWORK Riordan Manufacturing Physical Layout and Network Security Nadja Marava, Russell Elder, Roman Silva, and Logan Pickels University Of Phoenix CMGT 441 Introduction to Information Security Management Jude Bowman September 3, 2012 Riordan Manufacturing Physical Layout and Network Security As can be seen on the Intranet Website, Riordan currently operates four manufacturing plants; three located in the United States (San Jose, California; Pontiac, Michigan; and Albany, Georgia) and one overseas (Hang Zhou, China). Each plant contains the same basic departments, to include Sales and Marketing, Operations, Finance and Accounting, Information Technology (IT), Legal, and Human Resources. The problem; however, lies in all four plants Sales and Marketing, Operations, Finance and Accounting, and Human Resources departments, which have outdated and unconsolidated systems. China Physical Layout One location is China. The Wide Area Network being used has three T1 connections in the United States and a Satellite connection in China. This paper is used for determining the architecture for the Riordan WAN and then research what possible security measures can be taken to reduce Vulnerabilities. The Layout is below: • Ethernet Backbone 1G • Windows Exchange server Email • Windows Network server Domain controller • Unix Server for ERP/MRP Customer and Vendor Relations • Linksys Wireless Router • VOIP Satellite Connection ...

Words: 3147 - Pages: 13

Premium Essay

Mobile Computing and Social Networks Term Paper

...Mobile Computing and Social Networks. Abstract Mobile computing has rapidly evolved for the last two decades with the use of wireless technology making the location irrelevant and increasing the opportunities for business to streamline business processes, reduce operational processing times and provide better customer service. Mobile revolution has also forced many industries to reengineer their business processes to accommodate the many mobile devices. Mobile computing and social networks are part of the daily lives of millions of Americans. 42% of American adults own a mobile and tablet computing device. “Additional research shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities,...

Words: 4537 - Pages: 19

Free Essay

Wireless Industry Analysis

...innovative and reliable networks survive. Verizon currently dominates the market and services 31.9% of American mobile users. The company was established in 2000 as a joint venture between Vodafone and Verizon Communications. One of the Verizon’s largest acquisitions was the purchase of Alltell Wireless in 2009 for $28.1 Billion; this purchase expanded their network coverage and increased their market share. Verizon operates a CDMA Radio network which does not require the use of SIM cards. The company’s service quality is a competitive advantage and Verizon invests about $5.7 Billion per year to expand and upgrade their network services. Verizon boasts “America’s largest and most reliable network” and has over 160.3 Million subscribers. They recently added the iPhone to their product line in early February which has allowed the company to take a significant portion of sales away from AT&T. Verizon is one of the most expensive networks and appeals to customers who are willing to pay a premium for advanced network technology. In other news the FCC has accused Verizon of illegally adding charges to customers’ bills. The company was ordered to repay $52.8 million in funds back to customers in early October of 2010. AT&T wireless is the second largest service provider with 98.6 Million users in the U.S., Puerto Rico and Virgin Islands. The company has a more economic pricing structure and promotes rollover minutes. AT&T operates a GSM network, which is...

Words: 10350 - Pages: 42

Free Essay

Yeszcxzxxvzxcvxzc

...Routers and Cisco Integrated Services Routers, the broadest and most versatile portfolio of products for enabling the deployment of multiple advanced services. Cisco is the worldwide leader in networking systems for organizations of all sizes, offering solutions that fully support enterprise-wide deployment of networked business applications. A foundation of the Intelligent Information Network, Cisco routers provide high availability, comprehensive security, integrated wireless, ease of management, and advanced Quality of Service (QoS) for today’s most demanding network services, including IP communications, video, customer relationship management, financial transactions, and other real-time applications. This guide shows how Cisco Services Aggregation Routers and Cisco Integrated Services Routers enable you to meet your current and future needs with modular designs, allowing incremental migration as your business and network requirements change. In this guide, you can see for yourself how Cisco delivers benefits beyond basic data access, providing services such as voice, security, and wireless as part of an integrated routing system that maximizes productivity and investment protection. Cisco Router Guide Series Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 32978 - Pages: 132

Premium Essay

Securing and Protecting Information

...Securing and Protecting Information Instructor: April 24, 2014 Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public networks as well as private networks (including the Internet), use authentication to utilized or authorize logins and passwords. Data is required and ran through the password database to ensure that the user is authentic. Before anyone is allowed to access an organization’s intranet, they must first register or be registered by someone that has the appropriate credentials to perform these tasks. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: ...

Words: 1469 - Pages: 6

Free Essay

Internet of Things

...| Internet of Things | 2014| Pragya Vaishwanar | Aricent Marketing Research Report | Summary It’s fair to say that more people have heard of the “internet of things” than have experienced it. More objects are becoming embedded with sensors and gaining the ability to communicate. The resulting information networks promise to create new business models, improve business processes, and reduce costs and risks. There is breathless press coverage of the phenomenon—always patiently re-explained by tech pundits as the trend by which all of one’s most mundane possessions will become internet-connected. These are invariably coupled with estimates that the internet of things will be a multi-trillion dollar business. 2014 is really, finally the year that the “internet of things”—that effort to remotely control every object on earth —becomes visible in one’s everyday lives. In a sense the internet of things is already with us. For one thing, anyone with a smartphone has already joined the club. The average smartphone is brimming with sensors—an accelerometer, a compass, GPS, light, sound, altimeter. It’s the prototypical internet-connected listening station, equally adept at monitoring our health, the velocity of our car, the magnitude of earthquakes and countless other things that its creators never envisioned. Yet despite repeated declarations one of the most successful sellers of baubles that help make your home “smart,” Smart-things, has only shipped 10,000 or so units since...

Words: 13930 - Pages: 56

Premium Essay

Securing and Protecting Information

...Week 3 Securing and Protecting Information Security Authentication Process It is necessary to secure your authentication method to safeguard your system against varied forms of security threats, like brute-force or wordbook attacks, impersonation of users, and reply attacks. Additionally, if you share resources on your network with alternative organizations, you need to make sure that your authentication policies are interchangeable with the organization in which you are exchanging your information with. Authentication is the method in which a person must prove that they are who they say they are. Public and private networks, utilize authorized logins and passwords. Data is ran through the password database to ensure that the user is someone that has the credentials to access the network. In order to allow access a company’s intranet, they must register or be registered with the appropriate credentials to access this network. For this reason, net business and plenty of alternative transactions need additional authentication methods. “The utilization of digital certificates issued and verified by a Certificate Authority (CA) as a part of a public key infrastructure is taken into account probably to become the quality thanks to perform authentication on the web” (D'Arcy, Hovav, & Galletta, 2009). Process includes: Create a strong password policy Establish an account lock out policy Assign logon hours Create a ticket expiration policy Establish network authentication process ...

Words: 1442 - Pages: 6