Explain LAN security in an Organization

Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With wireless LAN comes the flexibility of either deploying it or removing it as pr the choice of the company. If the company wants a temporary connection during some seminar or a conference they can easily deploy it and after the usage they can remove it that too without incurring much cost as compared to wired networks. With the use of wireless networks, it becomes very easy for the organizations to scale up the wireless LAN by increasing the number of access points. Scalability becomes easy or the organization deploying the wireless network.

In denial of service the usage of the organization or the employee is limited and he is not able to access whole o the network. In eavesdropping the attacker monitors the data being shared or looked into. In man-in-the-middle the attacker interrupts the communication between the access points and the wireless client by asking about the credentials again and again. In masquerading, as the name suggests, the attacker poses to be the authorized user and as a result of which gains certain authorizations and privileges and can access those data also which are not meant for him. In message modification, the attacker modifies the original message by making some changes in the message in the form of addition or deletion of a part o the message. In message replay the attacker again acts as the authorized user and retransmits the message from time to time. In traffic analysis the attacker tries to gather the messages transmitted and then studies it to find a definite pattern so that he can decode the message. In order to access the password the attacker can change either the antenna or the location of the access point and can therefore retrieve the password.

   Related Questions in Computer Network Security

©TutorsGlobe All rights reserved 2022-2023.