List three recommendations to help secure a wireless network.

What will be an ideal response?


Here are a number of recommendations to help secure your wireless network:
·      Mandate the use of WPA2 and strong passkeys to encrypt wireless communications and to provide a basic layer of authentication.
·      Employ wireless IDS to help spot rogue access points, evil twins, wardriving, and other probes of the network.
·      Use mutual authentication methods - like EAP-TLS - in order to provide a level of trust by authenticating not only the client to server but also the server to the client.
·      For an added security layer, ensure that wireless connections authenticate via a VPN prior to gaining access to the wired network resources.

Computer Science & Information Technology

You might also like to view...

Discuss the bounds of network capacity formed by rewiring and new link addition in the context of small-world networks.

What will be an ideal response?

Computer Science & Information Technology

________ is the term used to describe the process of using your computer to view webpages

A) Browsing B) Pharming C) Phishing D) Surfing

Computer Science & Information Technology

What tag can be used to apply formatting inline, within another element?

What will be an ideal response?

Computer Science & Information Technology

Which software development model is a linear and sequential model?

A. spiral model B. agile model C. waterfall model D. hybrid model

Computer Science & Information Technology