When should you use the transitional security model?

What will be an ideal response?


In some situations it may not be possible to use WPA orWPA2 for wireless security because older equipment is being used.For example, a business may decide to reduce IT expenses by not upgrading its access points to supportWPA2. They rationalize that,"The older WLAN is still working, so we can get along for another year without the expense of upgrading," without considering the security implications. Or, a non-profit organization may have its funding reduced and cannot afford to replace the APs in its office. In these and similar situations, what type of wireless security should be implemented?

Under these circumstances the answer is to implement the highest level of security possible based upon the equipment in use. Although this is not a secure solution, it is the only practical alternative. It must be recognized,however, that this is only a transitional phase until a migration to software or hardware that supports stronger wireless security is possible. Sometimes called the transitional security model, it should only be implemented as a temporary solution.

Computer Science & Information Technology

You might also like to view...

Give an example of an unsafe state and show how all of the processes could complete without a deadlock occurring.

What will be an ideal response?

Computer Science & Information Technology

A theme in a PowerPoint presentation can be changed

Indicate whether the statement is true or false

Computer Science & Information Technology

The first three frames of a button are known as ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What must be known about the ADT Bag in order to use it in a program?

a. how entries in the bag are represented b. how bag operations are implemented c. how many entries can be stored in the bag d. the interface of the bag

Computer Science & Information Technology