WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY
WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY Performance Assessment GRP-1 Task 2 Table of Contents A. Wireless Local Area Network (WLAN) Vulnerabilities. 2 B. Mobile Device Vulnerabilities. 2 C. Steps for Mitigation. 3 D. Preventative Measures. 4 E. Recommended Solution for Bring Your Own Device (BYOD). 4 F. Cited Sources. 5 A. Wireless Local Area Network (WLAN) Vulnerabilities Within this section I will point specifically point out some of the potential Wireless Local Area Network (WLAN) vulnerabilities found during the initial review of the Alliah corporate headquarters. Even though these two vulnerabilities are the focus this WLAN Vulnerabilities section, a further, in-depth inspection and assessment may lead to others as well. Below are the two vulnerabilities that should be considered the first and foremost that should be considered to contain the most impact to the network infrastructure, corporate data, and employees and I recommend to address at the earliest stages. • The third floor is vacant for expansion, this space could easily house a rogue access point used for Man-in-the-Middle (MITM) attacks and data capture wherein “an attacker deploys an access point (AP) that has been configured to appear as part of an organization’s WLAN infrastructure” (NIST Special Publication 800-153, Guideline to Securing Wireless Local Area Networks (WLANs), 2012). If this unoccupied space is not secured, monitored, and inspected during both scheduled and unscheduled time periods a malicious actor could install and configure unknown wireless access points (WAP) for use as network/data monitoring and capture and to launch MITM attacks. • The patio area used by the employees could also be considered a vulnerability depending on the strength of the wireless network signal. Wireless sniffers can “sniff” out and find wireless networks and launch attacks and capture network traffic and corporate data. If the network signal extends into and past the boundaries of the Alliah external surroundings, mobile attackers using Wardriving and Warchalking techniques, “driving around office parks with attempting to connect to open access points” (NIST Special Publication 800-42 Guideline on Network Security Testing, 2003 and SP 800-115 Technical Guide to Information Security Testing and Assessment, 2008). This technique could be used to identify and access the Alliah network and also mark it for other potential malicious actors. While these above topics are but two examples, once again a thorough inspection of the Alliah headquarters and system security policies may provide additional vulnerabilities found that would need to be mitigated. B. Mobile Device Vulnerabilities
Geschreven voor
- Instelling
- WGU C844
- Vak
- WGU C844
Documentinformatie
- Geüpload op
- 8 maart 2024
- Aantal pagina's
- 9
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
1 wgu c844 emerging technologies in cy