Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Overig

WGU C844 GRP1 Task 2: Analysis of WLAN and Mobile Security Vulnerabilities|Accurate|Verified

Beoordeling
-
Verkocht
-
Pagina's
5
Geüpload op
03-04-2026
Geschreven in
2025/2026

WGU C844 GRP1 Task 2: Analysis of WLAN and Mobile Security Vulnerabilities

Instelling
Vak

Voorbeeld van de inhoud

WGU C844 GRP1 Task 2: Analysis of
WLAN and Mobile Security Vulnerabilities



Emerging Technologies in Cyber Security
(Western Governors University)

, A: WLAN VULNERABILITIES
The first potential vulnerability is the “large back patio area” that the employees of Alliah are
authorized to use. While it sounds like a nice addition for employees, it presents a handful of potential
threats to the company. Primarily, any attacker within range of the wireless signals could be able to sniff,
capture and even redirect network traffic. These are all examples of Man-in-the-Middle (MITM) attacks,
which is also a potential threat in the next WLAN vulnerability I noticed.
The second potential WLAN vulnerability involves the “Alliah website servers” which are 100
miles from the company’s headquarters. This is a common technique employed across many industries,
but there is no mention of a VPN or any other type of data encryption between company headquarters and
the data center. If there is no use of ‘in-flight’ encryption used for this data, it is extremely susceptible to
MITM attacks. This could imply the loss of account information, PII, and proprietary data just to name a
few.

B: MOBILE VULNERABILITIES
The first mobile-related vulnerability that came to my mind, as well as the second vulnerability,
involve the five account representatives at Alliah. This first vulnerability focuses on the ability of each
employee to connect to public Wi-Fi networks at places like Starbucks or Panera Bread. This was the
first consideration I had due to the fact that many companies across the world deal with the issues of
securing company data with traveling employees. If not done correctly, the use of public networks can be
one of the most dangerous things to do with a company machine.
As far as mobile vulnerabilities are concerned, the second is abundantly clear. The five
employees who are almost constantly traveling present a huge risk of company loss due to theft of
devices. These five employees each have a laptop, tablet, and smartphone. Any of these three devices
contain sensitive company data or, worse, present the thief with a route into the corporate network.

C: STEPS TO MITIGATE VULNERABILITIES
The first mentioned WLAN vulnerability, the patio area, has a few potential solutions, but I am
going to focus on one. Use the most secure, up-to-date wireless encrypted protocol. At the time of
writing, NIST recommends the used of IEEE 802.11i subset with either WPA or WPA2 as the protocol.
This information can be found in NIST SP 800-97 which can be retrieved from this address:
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf
The second WLAN vulnerability, which is the distance between Alliah headquarters and their
website servers, has a very simple solution; VPN. According to the abstract for NIST SP 800-77, “A VPN
can provide several types of data protection, including confidentiality, integrity, data origin
authentication, replay protection and access control.” This is exactly what Alliah needs to ensure is in
place for the security of their data. The full version of NIST SP 800-77, which includes documentation for
the implementation of an IPSEC VPN, can be found here:
https://csrc.nist.gov/publications/detail/sp/800-77/final

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
3 april 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
OVERIG
Persoon
Onbekend

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
CLOUND Exam
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
636
Lid sinds
3 jaar
Aantal volgers
389
Documenten
11668
Laatst verkocht
1 week geleden
PROF MM

HELLO WELCOME TO THIS PAGE WHERE YOU WILL FIND ALL EXAMS ,STUDY GUIDE ,CASE, TESTBANKS AND ANY OTHER STUDY MATERIALS,

4.0

123 beoordelingen

5
64
4
16
3
29
2
3
1
11

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen