Describe methods of implementing firewalls and ids systems


Research Homework: Wireless Security

Unit Outcomes:

a) Explain several network security protocols and their similarities and differences.
b) Differentiate a variety of network security and management tools.
c) Distinguish the most appropriate network security design for a given scenario.
d) Describe methods of implementing firewalls and IDS systems.
e) Analyze network administration tools and examine their significance in a range of network environments.

Course Outcome:

• Explore management aspects of protocols and topologies.

Purpose

A hard-wired LAN is relatively simple to secure while protecting data that travels across a wireless network can be more difficult. In this homework, you will examine appropriate security measures to be taken when accessing wireless networks.

Instructions

Wireless networks are much more common now than was true 5 to 10 years ago. There are wireless networks available in coffee shops, airports, and hotels, as well as a variety of other public venues. In addition, many home users now have wireless networks to connect a broad range of devices, such as smartphones, tablets, and computers within their dwelling. Consider your own use of wireless networks; do you use a smartphone or a tablet? Do your methods of securing your handheld devices differ from any methods that you may use when connecting wirelessly with a computer? Do you use a wireless network at your workplace? If so, what methods are used in your workplace for securing the wireless "cloud"? Would you suggest any improvements in the wireless security that you use for home and/or work?

Based on your research, write a 3 to 5 page paper that researches the concept of wireless security, as well as providing an analysis and comparison of several wireless security technologies currently available.

Format your homework according to the following formatting requirements:

i) The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

ii) The response also includes a cover page containing the title of the homework, the student's name, the course title, and the date. The cover page is not included in the required page length.

iii) Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describe methods of implementing firewalls and ids systems
Reference No:- TGS03043909

Now Priced at $35 (50% Discount)

Recommended (97%)

Rated (4.9/5)