+1-316-444-1378

 

 

  • Describe basic security concerns as they relate to wireless networks.

 

  • Assess the security vulnerabilities, including active protocols, to the unsecured network.

 

  • Describe your selection of devices added to the network and their role in meeting the security needs of the network to include a justification of the WIPS or WIDS and encryption method selection.

 

  • Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network.

 

  • Provide a rationale for all of your choices.
Categories: Uncategorized