When should you use the transitional security model?

What will be an ideal response?


In some situations it may not be possible to use WPA orWPA2 for wireless security because older equipment is being used.For example, a business may decide to reduce IT expenses by not upgrading its access points to supportWPA2. They rationalize that,"The older WLAN is still working, so we can get along for another year without the expense of upgrading," without considering the security implications. Or, a non-profit organization may have its funding reduced and cannot afford to replace the APs in its office. In these and similar situations, what type of wireless security should be implemented?

Under these circumstances the answer is to implement the highest level of security possible based upon the equipment in use. Although this is not a secure solution, it is the only practical alternative. It must be recognized,however, that this is only a transitional phase until a migration to software or hardware that supports stronger wireless security is possible. Sometimes called the transitional security model, it should only be implemented as a temporary solution.

Computer Science & Information Technology

You might also like to view...

An incident response procedure is then set in motion through a(n) ____ process.

A. informal incident reporting B. formal incident reporting C. informal incident management D. formal incident response

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Cloud service management includes all the service-related functions necessary for the management and operation of those services required by or proposed to cloud consumers. 2. Security and privacy are concerns that encompass all layers and elements of the cloud provider's architecture. 3. Physical resources are the computing, storage, and network resources that are fundamental to providing cloud services. 4. Wireless developments are crucial to the growth of IoT.

Computer Science & Information Technology

Add a dropdown SELECT list to Fig. 23.9 that allows you to choose the binary operator used for filter matching, from any of =, >, <, >= or <=.

What will be an ideal response?

Computer Science & Information Technology

Class data members are local to the class in which they're declared.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology