Netw360 Lab #6, Evaluating and Solving Common Security Problems

Submitted by: Submitted by

Views: 1749

Words: 576

Pages: 3

Category: Science and Technology

Date Submitted: 04/08/2012 05:47 PM

Report This Essay

Scenario 1

1. Would changing the antennas to a different type reduce the amount of signal spilling outside the building? Yes. In my opinion, changing the antenna type would reduce the amount of signal spilling outside of the building. (5 points)

2. If changing the antennas would reduce the signal spill, what type of antenna would you recommend? The type of antenna I would recommend would be a directional antenna. To be specific maybe a Yagi directional antenna would work better. (5 points)

3. Would relocating the access points to a different part of the building reduce the amount of signal spilling outside the building? Yes. Relocating the access points to a different part of the building would reduce the amount of signal spillage outside the building.(5 points)

4. Would changing the power level of the access points reduce the amount of signal spilling outside the building? Yes, changing the power level of the access points would reduce the amount of signal spillage outside the building. If it would, would this cause any other problems? Yes. It would cause the problem of very slow speeds for wireless users and intermittent or even complete signal loss. (5 points)

5. What other method could you suggest to prevent the signal from spilling outside the building? Another method that could be used is using a window tint that prevents signal from escaping by having the RF signal reflect back inside of the building.(5 points)

Scenario 2

1. Discuss the advantages and disadvantages of the three main ways of implementing security on this network.

WEP: Advantages - WEP offers is interoperability, since all wireless devices support basic WEP encryption. Also, during wireless detection, it can be discouraging to see that a key is required, which helps in deterring attackers.

Disadvantages - WEP encryption uses a shared key authentication and sends the same key with data packets being transmitted across the wireless network. If malicious users...