--%>

Explain LAN security in an Organization

Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With wireless LAN comes the flexibility of either deploying it or removing it as pr the choice of the company. If the company wants a temporary connection during some seminar or a conference they can easily deploy it and after the usage they can remove it that too without incurring much cost as compared to wired networks. With the use of wireless networks, it becomes very easy for the organizations to scale up the wireless LAN by increasing the number of access points. Scalability becomes easy or the organization deploying the wireless network.

In denial of service the usage of the organization or the employee is limited and he is not able to access whole o the network. In eavesdropping the attacker monitors the data being shared or looked into. In man-in-the-middle the attacker interrupts the communication between the access points and the wireless client by asking about the credentials again and again. In masquerading, as the name suggests, the attacker poses to be the authorized user and as a result of which gains certain authorizations and privileges and can access those data also which are not meant for him. In message modification, the attacker modifies the original message by making some changes in the message in the form of addition or deletion of a part o the message. In message replay the attacker again acts as the authorized user and retransmits the message from time to time. In traffic analysis the attacker tries to gather the messages transmitted and then studies it to find a definite pattern so that he can decode the message. In order to access the password the attacker can change either the antenna or the location of the access point and can therefore retrieve the password.

   Related Questions in Computer Network Security

  • Q : What is S/MIME What is meant by the

    What is meant by the term S/MIME?

  • Q : Computer crime Explain the term

    Explain the term Computer crime and what are the Suggestion to stop them ?

  • Q : Wired equivalent privacy or WEP-LAN

    WEP (wired equivalent privacy): Wired equivalent privacy is capable of providing the same level of privacy as it is there in the wired network. The WEP makes use of a static key which both the access points and the clients know. The static key helps i

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network

  • Q : Public key cryptography Explain the

    Explain the application of public key cryptography.

  • Q : Topologies and Configuration Tasks

    Assessed Learning Outcomes 1  Design a small routable network comprising LAN and WAN components 2  Configure routers to implement small routable networks Scenario You are a ne

  • Q : What is hash function Explain the term

    Explain the term hash function?

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

  • Q : Analysis on Wireless Technology 1.

    1. Summarize what is being accomplished in this section in a few sentences. What is being accomplished here is that we have created a sequence generator that outputs two short random messages. The multiple sequence source generates

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen