...AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current hardware and software, inventory of current APs, wireless devices, ports, stations and their...
Words: 18577 - Pages: 75
...Case Analysis Canadian Imperial Bank of Commerce Wireless Strategy The Canadian Imperial Bank of Commerce was founded in 1961 and is one of North America’s leading financial institutions. CIBC has a newly formed electronic banking division solely mandated to monitor emerging trends and to adapt to these trends. The outcome of the divisions work is to identify new products/technologies and decipher how said technology can be used to better serve the institutions customers. During the late 1990’s wireless technology was becoming widely available to the average consumer. CIBC identified this trend and is looking for ways to implement wireless banking into its product offering. As outlined in the case provided, wireless internet devices are expected to outsell personal computer sales by 2001. CIBC is very interested in penetrating this market in turn providing the best possible service to its customers and differentiating itself from the other major competitors in the North American banking industry. Some major issues that need to be address regarding the implementation of CIBC’s wireless banking system are as follows; the various platforms that can be used to access the banks wireless system need to be understood and the system needs to be built to accommodate each; the various wireless network carriers need to be evaluated and the system needs to be built to function with all; lastly and most importantly the system needs to maintain the institutions overall reputation as well...
Words: 2578 - Pages: 11
...NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller Click Link Below To Buy: http://hwcampus.com/shop/netw-589-entire-course-wireless-communication-ended-feb-2015-keller/ Or Visit www.hwcampus.com NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller NETW 589 Case Study Wireless Communication Week 5 Keller 12 Power Point Slides Plus Speaker Notes Case Description The organization you work for has leased a building next door to the existing building. The local area networks in the new building and the existing building must be linked to each other. The distance is 657 feet. Here is the relationship of the two buildings. Notice that the blue dashed line showing the route of the link crosses a parking lot not under your control. It also crosses a public street. Both buildings are two stories tall. From the second floor or the roof of each building there is a clear line of sight above the expected height of any vegetation currently in the area. You have been assigned the task of determining the available wireless methods that could be used to connect the buildings to each other and presenting these options to the executive team. The executive team consists of the CEO, the CFO, and the managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand: The way the method transmits data back and forth The advantages of the method The disadvantages...
Words: 2200 - Pages: 9
...PROJECT SCOPE PROJECT OBJECTIVE The purpose of this contract is to provide Umbrella Auto insurance with Network Infrastructure for its new office at Stoughton- MA, within 2 months at cost not to exceed $75,000. The building consists in 3 offices, one customer service and one first floor. The building shall be fully outfitted with the latest Network infrastructure, highly available, fault tolerant, extremely secure and capable of providing the high quality technology required to run the latest generation of data, voice and video applications. DELIVERABLES • #2 2000-square-foot, 3 offices , 1 customer service, 1firstfloor • Offices will include the desktops, printers and cabling • Costumer service will include printer, desktop and 1 laptop with wifi connection • Fast-ethernet. • Switches • Equipment rack • Patch panel • Cables • Wall plates * NETWORK INFRASTRUCTURE DESCRIPTION * The new Umbrella Auto offices consists in 3 offices (A-B-C), 1 customer service and1 first floor. * Office A has a dedicated Telecomm wiring closet. The rack has 12RU of space dedicated for installation of network equipment. * Data Centre is located on the 1st floor and has its own data server runinng. * Vertical backbone cabling * Horizontal structured cabling and will be based on CAT-6 to perform a better quality * Approximately 15 different users are expected to occupy this office with different schedule * Wireless Network This network also...
Words: 482 - Pages: 2
... Wireless Network Implementation Project Business case Hector Cloete Contents Statement of Work3 Background3 Corporate Objectives3 Solution3 Cost Benefit4 Sources of finance5 Project finance5 Marketing plan5 Stakeholder Analysis5 Company Resources5 Operational Configuration6 Build Method6 Risks7 Conclusion7 Statement of Work The retail banking division of United Banks has requested IT to build an application where branch staff can service customers whilst they are standing in branch queues. A wireless network is a key requirement for the application developed by the business to enable better customer service within branches. This document will detail the business case for the implementation of a wireless network in each one of United Bank’s 500 branches in order to meet the business requirement above Background United Bank has a footprint of 500 branches spread across all provinces in South Africa. The branches are connected via a MPLS network to a central head office data center in Johannesburg which hosts the banks core banking applications. The banking applications are used by branch personnel to perform various banking service to clients. Clients have to queue at tellers in order to be services and queues are often lengthy resulting in unhappy clients and poor service response times. In order to alleviate this problem and provide an improved customer service the bank has developed an application call iHelp...
Words: 1616 - Pages: 7
...Wireless Technologies Introduction As wireless technology has begun to mature, the demand for wireless products has increased as new applications for the technology are realized. One application for wireless technology at the U.S. Naval Academy is to use the wireless capability to enhance classroom instruction. Currently the Electrical Engineering and Physics Departments have wireless access points and wireless laptops/desktops available for classroom instruction. The purpose of this report is to provide the technical research necessary to aid decision makers in determining which wireless technologies the Naval Academy should invest. Background In a wireless network, computers communicate with the network through a radio path vice a cable. The device that contains the radio and connects to the wired network is called the “Access Point”. Each client that communicates with the access point must have a wireless PCMCIA card. Once both devices communicate via radio transmission, network access can begin. Each client is configured to communicate with a single access point. A client can move from one access point to another. Roaming from access point to access point (cell to cell), similar to cellular telephone technology, is possible. Technology Discussion There are three wireless technology standards on the market today: Bluetooth, 802.11b, and 802.11a. A new standard, 802.11g, was recently approved by IEEE and products using this technology are expected...
Words: 1089 - Pages: 5
...Network Design Project Intruction Kudler Fine Foods is making steps to inhanse the existing network, including wireless technology. These changes are being provided to improve the comuunication links between the stores and all employees. We will be implementing new technologies to automate inventory managment by creating orders of products from the transactions at the POS. The VOIP phones will be repalced with wireless VOIP phones and will allow for the employees to take calls as they provide servieces for their costumers. The improvements in network security will provide real time monitoring. Timeline The redesign of the Kudler Fine Foods will be an extreme undertaking. We will need three months to fully reconfigure the network. Since each store will have to have new cable and equipment run throughout, the downtime for each location will be minimul. In the network closet the new router will be installed, along with the two new switches. The Cat 6 Ethernet has to be run from this closet to each access point. The two servers will need to be backed up and the data will be uploaded to the new servers. A wireless access point will be added to the network and the printers and VOIP phones will be configured. While the store is closed, all the user devices will be connected to the new ports and the network will be connected to the inetnet. Design Approach and Rationale My approach to the design of this network starts with security and usablilty. The network most be fast, reliable...
Words: 1077 - Pages: 5
...Wireless Technology and Communication in Healthcare Biomedical Informatics Program Information Technologies in Medicine and Telehealth Course Instructor: Dr. Bronsburg Submitted by Rajesh Krishnan Written Assignment 1 You are the CIO of ACME Hospital in a rural underserved area. Your HCO recently received resources from a wealthy investor in the community to upgrade the hospitals communications system to a wireless platform. The boards of directors are not convinced this is a good thing, and have mixed feelings on what this will mean for the hospital. They all have cell phones but are unclear of the connection to medicine. Prepare a 4-6 page MS word document explaining to the board of directors what is wireless technology, how it works, its history, use in telemedicine, and what applications these technologies may be used for at the hospital setting. Read Chapter 1 to begin to answer these questions. What is wireless technology? Wireless technology is rapidly growing, and is playing an increasing role in people around the world in healthcare industry. Wireless is a term used to describe telecommunications in which electromagnetic waves instead of wires carry the signal over part or the entire communication pathway. The fourth generation cellular networks have greatly improved data transmission speed. In the meantime, short-range radio such as Bluetooth, Hiperlan, and infrared transmission are helping with wireless broadband multimedia and data communication in both...
Words: 2153 - Pages: 9
...Running head: Wireless Deployment Plan Term Paper: Wireless Deployment Plan Dr. Edwin Otto CIS 513 – Wireless Computing September 7, 2014 Wireless Deployment Plan For successfully deploying a wireless network plan, there are specific steps that would need to be taken to ensure proper deployment and for all aspects to be covered. It is necessary first to have a site survey completed, which would give the insight into which is the best and the worst places on campus to have the wireless connections. Once this has been completed, a thorough site survey would give ideal locations for the access points for your WLAN, bit rates and error rates in different locations. The performance of the applications on the WLAN and the number of access points that would be needed for deployment. This is necessary to be able to allow access to those who need access throughout the campus but also to assess security concerns and to keep the network secure. Proper deployment steps would help to alleviate the myriads of issues that commonly come up with the implementation of new or upgraded networks. A further aspect of the deployment process would be the consideration of how many users would likely use the network at any given time. This consideration would be part of the planning process to enable the ability to deliver the highest quality WLAN experience. The scope of the work would be specifically...
Words: 2199 - Pages: 9
...Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues Mobile computing devices are getting smaller and more powerful, while the amount of information is growing astronomically. As the demand for connecting these devices to content-rich networks rises, WWAN technology seems like the perfect answer. But today's wireless WANs have some limitations. This white paper discusses those limitations and how NetMotion™ overcomes them. · Specialized equipment and custom applications were needed for deployment over these proprietary wireless systems. · Often the wireless infrastructures themselves were difficult to deploy. · Only a small percentage of the working population was mobile, so corporations considered wireless data deployment a significant investment with little return. Why the resurgence of interest in wireless data networking technologies now? In the late twentieth century, a few interesting social and technological developments took place. In the late 1990's, businesses began seeing the economic benefit of having employees who work away from their campuses. These remote (and sometimes nomadic) workers needed access to everyday corporate information to do their jobs. Providing workers with remote connectivity became a growing challenge for the information staff. Handheld and pocket-sized computers became powerful enough to be useful. The convergence of Internet networking technologies made IP the de facto standard. New standards such...
Words: 3176 - Pages: 13
...the late 1940s, the amount of time needed for the calculations was dramatically decreased. Suddenly, this model became very popular, and today it forms the basis for all weather forecasting. The point here is that it sometimes requires vision to see how an idea or technology could be used. This vision also applies to new technologies like wireless communications. Some users question why we should consider wireless technology when the existing wired system seems to work just fine. In this chapter, you will learn what it takes to convert the potential of wireless technology into a successful business reality. We’ll look at the steps needed to incorporate wireless technology into a business, and at the advantages and challenges that face business users who consider adopting this new technology. Advantages of Wireless Technology The advantages of incorporating wireless technology into a business are far-reaching and can positively impact an organization in many ways. In addition to the advantages already discussed in this book—mobility of data access, easier network installation, increased reliability, and better disaster recovery—wireless technology provides business-specific advantages, including universal access to corporate data, increased productivity, ability for customers to access their own data, data availability around the clock, and improved information...
Words: 8259 - Pages: 34
...Updated Wireless At Reading Room Bookstore/ Café Prepared for: Mrs. Karen Dickens, Owner of Reading Room Bookstore/ Café Prepared by: Wendell Brown, Peter Bacon, and Alex McCurdy Owners of Keep Austin Wireless April 25, 2014 Table of Contents Executive Summary 2 Introduction 2 Methods 3 Which 802.11 specification is best for your specific needs? 3 Should we get a router that works at 2.4 GHz, 5 GHz, or both? 3 What security level is best for your business? 4 What speed router should be considered? 4 What else should our router(s) have for current or future considerations? 4 What would happen if something were to go down? 5 How many UPS-powered outlets do we need? 5 How much power do our devices require? 5 How long do we need to use the battery? 5 How many feet of Ethernet cabling do we need? 5 Results 7 Conclusions 8 Decision Matrix 10 Recommendation 11 Assumptions 13 Installation 15 Equipment Parts List 16 Works Cited 17 List of Illustrations Figure 1: Picture of Linksys EA6900 (Linksys Employee, 2014) 7 Figure 2: Picture of ASUS RT-AC66U (Endgadget Employee, 2014) 7 Figure 3: Picture of Trendnet TEW-812DRU (Softpedia Employee, 2014) 7 Figure 4: Decision Matrix 8 Figure 5: High Level Parts Diagram 10 Table 1: Detailed parts list (Bacon, 2014) 10 Executive Summary This report was developed to summarize the newer, better, and more secure wireless network...
Words: 3845 - Pages: 16
...1/19/2015 1/19/2015 One Giant Leap for Apex Design Wireless Network Plan One Giant Leap for Apex Design Wireless Network Plan Team B Team B Apex Design has found the need to incorporate a wireless network to collaborate with their existing wired network. Team B found this opportunity to display to Apex what they can do to bring their company to enjoy the modern conveniences of a wireless network. This deployment plan will cover Team B’s recommendations based off of the site survey provided by Apex. We will discuss our recommended wireless network type. The access point layout and how these points will be managed. We will go over the foreseen obstacles and what our plan is to overcome these obstacles. Finally, we will go over the security policy that should be implemented to keep Apex as secure with our wireless network as they are with their current wired network. IEEE Network Type Apex Designs has asked our company to design a wireless network for their business. This network will consist of several different pieces of hardware that all will work together to meet Apex’s needs. To ensure that the new network is operational, special considerations must be made as to which IEEE network standard to be used. Since Apex Designs is a business that has a preexisting network installed, the new network must be compatible with the legacy systems already in use. Failure to meet this requirement would cause major interruptions in work flow, thus hindering...
Words: 1940 - Pages: 8
...Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any vulnerabilities that are discovered shall be kept confidential unless federal, state, or local law requires that they be disclosed or the statement of work specifies otherwise. This Document also certifies that the undersigned testifies that the Client has sufficient disaster recovery systems and insurance in the event of an incident during or after the test procedures. Part 3: Penetration Test Client Questions If black box is selected, do not fill out question 3 or following sections. 1. Black Box | White Box (please circle one) 2. Intrusive | Non-Intrusive (please circle one 3. Test Credentials: (fill in as many as needed) Username | Password | | | | | | | | | | | | | | | E-Commerce Web-based Application Server 1. Authorized to View Source? Yes | No (please...
Words: 652 - Pages: 3
...Abstract:-The fourth generation of mobile networks will truly turn the current mobile phone networks, in to end to end IP based networks, couple this with the arrival of IPv6, every device in the world will have a unique IP address, which will allow full IP based communications from a mobile device, right to the core of the internet, and back out again. If 4G is implemented correctly, it will truly harmonize global roaming, super high speed connectivity, and transparent end user performance on every mobile communications device in the world. 4G is set to deliver 100mbps to a roaming mobile device globally, and up to 1gbps to a stationary device. With this in mind, it allows for video conferencing, streaming picture perfect video and much more. It won’t be just the phone networks that need to evolve, the increased traffic load on the internet as a whole (imagine having 1 billion 100mb nodes attached to a network over night) will need to expand, with faster backbones and oceanic links requiring major upgrade. 4G won’t happen overnight, it is estimated that it will be implemented by 2012, and if done correctly, should takeoff rather quickly. 4G networks i.e. Next Generation Networks (NGNs) are becoming fast and very cost-effective solutions for those wanting an IP built high-speed data capacities in the mobile network. Some possible standards for the 4G system are 802.20, Wi-MAX (802.16), HSDPA, TDD UMTS, UMTS and future versions of UMTS. The design is that 4G will be based on OFDM...
Words: 3876 - Pages: 16