--%>

Explain LAN security in an Organization

Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With wireless LAN comes the flexibility of either deploying it or removing it as pr the choice of the company. If the company wants a temporary connection during some seminar or a conference they can easily deploy it and after the usage they can remove it that too without incurring much cost as compared to wired networks. With the use of wireless networks, it becomes very easy for the organizations to scale up the wireless LAN by increasing the number of access points. Scalability becomes easy or the organization deploying the wireless network.

In denial of service the usage of the organization or the employee is limited and he is not able to access whole o the network. In eavesdropping the attacker monitors the data being shared or looked into. In man-in-the-middle the attacker interrupts the communication between the access points and the wireless client by asking about the credentials again and again. In masquerading, as the name suggests, the attacker poses to be the authorized user and as a result of which gains certain authorizations and privileges and can access those data also which are not meant for him. In message modification, the attacker modifies the original message by making some changes in the message in the form of addition or deletion of a part o the message. In message replay the attacker again acts as the authorized user and retransmits the message from time to time. In traffic analysis the attacker tries to gather the messages transmitted and then studies it to find a definite pattern so that he can decode the message. In order to access the password the attacker can change either the antenna or the location of the access point and can therefore retrieve the password.

   Related Questions in Computer Network Security

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

  • Q : Types of information derived from

    Explain the types of information which are derived from the traffic analysis attack?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : End-to-end encryption and link State

    State the difference between end-to-end encryption and link?

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : Steps for preparing envelope data MIME

    Specify the steps used for preparing the envelope data MIME?

  • Q : Project to simulate network attack

    Write an Idea for programming project to simulate a network attack or threat mechanism or a defense mechanism. Encipher message by using a keyword;

    Q : General LAN Security setup General LAN

    General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the defaul

  • Q : Services by PGP Specify the services

    Specify the services which are offered by the PGP services?

  • Q : Secure a network perimeter How can you

    How can you secure a network perimeter? Be ensure to discuss all three of the basic access points into most networks, as well as the different types of firewalls commonly used today.