Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
01-05-2024
Written in
2023/2024

WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY Performance Assessment GRP-1 Task 2 Table of Contents A. Wireless Local Area Network (WLAN) Vulnerabilities. 2 B. Mobile Device Vulnerabilities. 2 C. Steps for Mitigation. 3 D. Preventative Measures. 4 E. Recommended Solution for Bring Your Own Device (BYOD). 4 F. Cited Sources. 5 A. Wireless Local Area Network (WLAN) Vulnerabilities Within this section I will point specifically point out some of the potential Wireless Local Area Network (WLAN) vulnerabilities found during the initial review of the Alliah corporate headquarters. Even though these two vulnerabilities are the focus this WLAN Vulnerabilities section, a further, in-depth inspection and assessment may lead to others as well. Below are the two vulnerabilities that should be considered the first and foremost that should be considered to contain the most impact to the network infrastructure, corporate data, and employees and I recommend to address at the earliest stages. • The third floor is vacant for expansion, this space could easily house a rogue access point used for Man-in-the-Middle (MITM) attacks and data capture wherein “an attacker deploys an access point (AP) that has been configured to appear as part of an organization’s WLAN infrastructure” (NIST Special Publication 800-153, Guideline to Securing Wireless Local Area Networks (WLANs), 2012). If this unoccupied space is not secured, monitored, and inspected during both scheduled and unscheduled time periods a malicious actor could install and configure unknown wireless access points (WAP) for use as network/data monitoring and capture and to launch MITM attacks. • The patio area used by the employees could also be considered a vulnerability depending on the strength of the wireless network signal. Wireless sniffers can “sniff” out and find wireless networks and launch attacks and capture network traffic and corporate data. If the network signal extends into and past the boundaries of the Alliah external surroundings, mobile attackers using Wardriving and Warchalking techniques, “driving around office parks with attempting to connect to open access points” (NIST Special Publication 800-42 Guideline on Network Security Testing, 2003 and SP 800-115 Technical Guide to Information Security Testing and Assessment, 2008). This technique could be used to identify and access the Alliah network and also mark it for other potential malicious actors. While these above topics are but two examples, once again a thorough inspection of the Alliah headquarters and system security policies may provide additional vulnerabilities found that would need to be mitigated. B. Mobile Device Vulnerabilities

Show more Read less
Institution
Course

Content preview

6/21/23, 11:18 C844 Emerging Technologies in Cybersecurity PA
AM Task 2
1.




WGU C844
EMERGING
TECHNOLOGIES IN
CYBERSECURITY
Performance Assessment GRP-1 Task 2




about:bla 1/9
nk

, 6/21/23, 11:18 C844 Emerging Technologies in Cybersecurity PA
AM Task 2




Table of Contents
A. Wireless Local Area Network (WLAN) Vulnerabilities............................................................................ 3
B. Mobile Device Vulnerabilities................................................................................................................... 3
C. Steps for Mitigation................................................................................................................................... 4
D. Preventative Measures............................................................................................................................... 5
E. Recommended Solution for Bring Your Own Device (BYOD).................................................................8
F. Cited Sources............................................................................................................................................. 8




about:bla 2/9
nk

Written for

Course

Document information

Uploaded on
May 1, 2024
Number of pages
9
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.39
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TopGradeSolutions Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
91
Member since
2 year
Number of followers
9
Documents
13175
Last sold
5 hours ago
TOPGRADESOLUTIONS

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
4.9

171 reviews

5
159
4
7
3
4
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions