100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

C844 Emerging Technologies in Cyber Security Task 2 PASSED TASK 2025 Western Governors University

Rating
-
Sold
-
Pages
5
Uploaded on
02-01-2025
Written in
2024/2025

C844 Emerging Technologies in Cyber Security Task 2 PASSED TASK 2025 Western Governors University










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 2, 2025
Number of pages
5
Written in
2024/2025
Type
Other
Person
Unknown

Subjects

Content preview

C844 Emerging Technologies in Cyber Security Task 2 PASSED TASK 2025
Western Governors University


C844 Task 2



A. WLAN Vulnerabilities

First Vulnerability for WLAN

• Extended Range from Outdoor Access Point: The outdoor wireless access point (WAP)
servicing Alliah's back patio area extends the network’s range beyond the building’s
physical security perimeter. This setup allows anyone nearby, even those not inside
the building, to detect and potentially access the WLAN. Such exposure can lead to
unauthorized access attempts, data capture, and potential "Evil Twin" attacks, where
an attacker sets up a decoy network to capture employee credentials and sensitive
data (Doherty, 2021).

Second Vulnerability for WLAN

• Lack of Encrypted Connections Between Headquarters and Remote Servers: Alliah’s
website servers, located 100 miles from headquarters, are remotely accessed by IT
staff via Ethernet connections. Without an encrypted channel, such as a Virtual Private
Network (VPN), data sent across this distance could be intercepted by attackers using
packet-sniffing techniques, making it vulnerable to Man-in-the-Middle (MITM) attacks.
Sensitive company data and customer information could be compromised without
securing these communications (“What is a Network Intrusion Detection System? |
DataDome,” 2022).


B. Mobile Vulnerabilities

First Vulnerability for Mobile Devices

• Unsecured Public Wi-Fi Usage by Traveling Employees: Alliah’s account representatives,
who travel frequently, may connect to public Wi-Fi networks, which are inherently
insecure. Without protections, using public Wi-Fi exposes devices to interception, data
theft, and unauthorized access through attacks like MITM. This is particularly concerning
for Alliah, as these employees handle sensitive customer data and company information
(Nield, 2020).

Second Vulnerability for Mobile Devices

, • Risk of Device Theft: Account representatives carry company-issued laptops, tablets,
and smartphones, each containing sensitive data. With employees spending significant
time on the road, these devices are at risk of loss or theft. If a device is stolen and lacks
encryption or remote-wipe capability, the thief could gain access to proprietary data
and potentially gain access to Alliah’s network (“6 Best Software to Remote Wipe
(Official & Licensed MDM),” n.d.).


C. Mitigation

First Mitigation for WLAN

• Mitigation for Extended Outdoor Access Point Range: Implement WPA3 encryption
across all WAPs to strengthen security. Enable MAC address filtering and hide the SSID
to prevent unauthorized devices from connecting. To further reduce risk, physically
limit the signal range of outdoor WAPs and consider using physical barriers like
reflective films to contain the signal within designated areas.

• Tools: WPA3 encryption protocols, MAC filtering software, WAP configuration settings.

• Documentation: Souppaya & Scarfone,

2012. Second Mitigation for WLAN

• Mitigation for Lack of Encryption for Remote Server Access: Deploy a VPN solution,
such as Cisco AnyConnect or Google Cloud VPN, to encrypt traffic between
headquarters and remote servers. This will ensure data integrity and confidentiality
by creating a secure, encrypted tunnel for sensitive data transmission.

• Tools: VPN software, multifactor authentication for VPN access.

• Documentation: “The Top 11 Enterprise VPN Solutions | Expert Insights,” last
updated Nov 06, 2024.

First Mitigation for Mobile Devices

• Mitigation for Unsecured Wi-Fi Usage: Implement a company-wide VPN for mobile
devices. Require VPN connections for all remote work over public Wi-Fi, ensuring all
communications are encrypted. Train employees to use only secure protocols (e.g.,
HTTPS) and enable device firewalls to further reduce risk.

• Tools: VPN software, device firewalls, employee training materials.

• Documentation: Nield, 2020.

Second Mitigation for Mobile Devices

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartzone Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3198
Member since
5 year
Number of followers
2291
Documents
14397
Last sold
3 hours ago
AMAIZING EDUCATION WORLD

GET ALL KIND OF EXAMS ON THIS PAGE ,COMPLETE TEST BANKS,SUMMARIES,STUDY GUIDES,PROJECT PAPERS,ASSIGNMENTS,CASE STUDIES, YOU CAN ALSO COMMUNICATE WITH THE SELLER FOR ANY PRE-ORDER,ORDER AND ETC.

3.7

584 reviews

5
260
4
93
3
103
2
29
1
99

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions