SlideShare a Scribd company logo
1 of 2
IS 3868 Nicole Gaehle
Assignment 2
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
There are securityconcernsthatorganizationsshouldconsiderwhensecuringlocal area
networksandespecially,wirelesslocal areanetworks.“Organizationsshouldhave standardizedsecurity
configurationsfortheircommonWLAN components,suchasclientdevicesandAPs.A standardized
configurationprovidesabase level of security,reducingvulnerabilitiesandlesseningthe impactof
successful attacks.Standardizedconfigurationuse improvesthe consistencyandpredictabilityof
security,inconjunctionwithusertrainingandawarenessactivitiesandothersupportingsecurity
controls.”(Souppaya&Scarfone,2012) Local AreaNetworksare wirednetworksthatcanbe easily
accessedif someone onthe WirelessLocal AreaNetworkfoundabackdoorto getintoit. For example,
UMSL has a Local AreaNetworkoncampus that iswiredbuttheyalsohave the WirelessLocal Area
Networkthatistiedoff the Local AreaNetwork.UMSL wouldhave hadto take into considerationon
whatto do whentheyfirst setup theirinternetwhenfirstbeingbuilt.The components of the network
wouldhave hadto be standardizedtoallow studentsbe able togaininternetaccessbutwouldnotallow
themto sneakintothe backdoorof the networktoput a virusonto the network.ThroughoutUMSL
campusthere are APs(AccessPoints) thatwouldhave beenconfiguredtoallow certainpacketsof data
inand to blockcertainpacketsof data tobe clearedorviewedbeforebeingable tobe used.The
standardizationsecuritywasused campus-wide tobe able toallow studentsandprofessorstogetinto
the network.“Before designingaWLAN securityarchitecture orWLAN componentsecurity
configurations,anorganizationshouldgatherinformationonneeds,particularlyoperational and
securityones.”(Souppaya&Scarfone,2012) The IT networkteamof UMSL wouldhave neededto
gatheras much entail aspossible tobe able todetermine whatkindof architecture theyare needingto
buildfortheirlocal areanetworkandwirelesslocal areanetwork.Particularlythe wirelesslocal area
networkbecause thatisthe most commonuse forsuch a large campus. “WhenplanningWLAN security,
configurationdesignersshouldconsiderthe securitynotonlyof the WLAN itself butalsohow itmay
affectothernetworksthatare accessible throughit,suchas internal wirednetworksreachable fromthe
WLAN.An importantprincipleof WLAN securityistoseparate WLANswithdifferentsecurityprofiles.”
(Souppaya&Scarfone,2012) UMSLs configurationdesignersintheirnetworkteamwouldhave needed
to come up witha designthatwouldworkand implementagoodnetworkstrengthfortheirstudents
and facultytobe able touse LANs andWLANs.Most campuscomputersare wiredbuttheyalsoneeded
the wirelesslocal areanetworksofacultyandstudentswhouse theirowncomputerscouldconnectto
the internet.UMSL needs tomeetthe needsof all studentsandfacultysotheycan use the internetfor
classesbeingtaughtortakenfor a degree.The securityneededneedstobe a standardized
configurationforLANsandWLANs.
LANsand WLANsare technicallypartof Networksof ‘Things’.“’Things’canoccur inphysical
space or virtual space.”(Voas,2016) Physical andvirtual space islike anygeneral commonknowledge
that youcan thinkof. So physical isconsideredtobe like humans,vehicles,computers,etc.Virtual is
consideredtobe like software,cloudservice,files,social medialikeFacebook,etc.“The primitivesof a
NoT are:1) sensor,2) aggregator,3) communicationchannel,4) eUtility,and5) decisiontrigger.There
may be some NoTsthat doesnot containall of these,butthat will be rare.” (Voas,2016) For instance,
we all have primitivesthatmake us be whowe are. We are similartocomputers,software,andsocial
media.“Sensorisanelectronicutility thatmeasuresphysical propertiessuchastemperature,
acceleration,weight,sound,location,presence,identity,etc.” (Voas,2016) We all have a physical
IS 3868 Nicole Gaehle
appearance thatsomeone canassume weight,temperature (anger/sad), where we are,andhow we
presentourselves.However, the temperature canbe anythinglike how madwe are,how sad we are,or
evenourphysical temperature totell how sickwe are.“Aggregatorisa software implementationbased
on mathematical function(s) thattransformsgroupsof raw data intointermediate,aggregateddata.”
(Voas,2016) Inhis instance,ahumanis nota greatexample. Instead,thinkof acalculatorona computer
or a regularcalculator.Forsomeone touse a calculatorit ismade of functionslikeadding,subtracting,
dividing,square rooting,squaring,etc.A calculatorisa software-baseddevicethattakesfunctionsand
takesraw data that we inputandcalculatesan answerforus.For example,2plus8 divided by2would
getyou the answerof 2. “CommunicationChannel isamediumbywhichdataistransmitted(e.g.,
physical USB,wireless,wired,verbal,etc.).” (Voas,2016) We all have to communicate toa computer
somehowaswell as to anotherindividual.Toprocessthe communicationtoa computeristo inputa
USB to pull up filesortoenterwords(as I am usinghere) butthe computerisrecognizingthisasbinary
(bytes) data. “AneUtility(external utility) isasoftware orhardware productor service.”(Voas,2016) A
computerisa piece of hardware thatprovidesaservice toeducatorsandemployerstobe able to
communicate topeople.“A decisiontriggercreatesthe final result(s) neededtosatisfythe purpose,
specification,andrequirementsof aspecificNoT.” (Voas,2016) A specificNoT(Networkof ‘Things’)
wouldbe a computer.Thisdocumentisan example of adecisiontrigger.Thisisdue tothat fact that the
software inmycomputeriscomputingdata andallowingme tosee the endresult(final result) of the
paper.Withouta computer,we wouldneedtouse a standardtypewriterthatmakesyouphysically
move to the nextrowon the piece of paper.Thissoftware onthe eUtilityallowsustoeliminate the
original typewriterandallowsof acommandto go the nextline of the document. “NoTscanbe open,
closed,orsomewhere inbetween.” (Voas,2016) For example,acomputerhashundredsof sensors,
numerousharddrives,aCPU or more,wiredcommunication,databases,andwithoutanywired
connectiontoa network.Thiswouldbe consideredan in-betweenstate of openandclosed.
In conclusion,NoTsandWLANsare similartoone another.Theyneed tobe configuredtobe
secure to the usersof those services.Thiscanbe anywhere yougo.It can be at a restaurant,yourhouse,
the library,a car shop,schools,etc.A standardizedsecurityconfigurationisbestusednomatterwhere
yougo.
Bibliography
Dawson,M., & Omar, M. (2015). NewThreats and Countermeasurein Digital Crime and CyberTerrorism.
Hershey:InformationScience Reference (animprintof IGIGlobal).
Souppaya,M., & Scarfone,K.(2012). GuidlinesforSecuringWirelessLocal AreaNetworks(WLANs). NIST
Special Publication 800-153.
Voas,J. (2016). Networksof 'Things'. NISTSpecial Publication 800-183.

More Related Content

Similar to Analysis: Guidelines for Securing WLANS and Networks of ‘Things’

Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerIOSRjournaljce
 
Torry Harris API and Application Integration Governance Framework
Torry Harris API and Application Integration Governance FrameworkTorry Harris API and Application Integration Governance Framework
Torry Harris API and Application Integration Governance FrameworkShubaS4
 
Actionable Intelligence From Unstructured Data using MDA
Actionable Intelligence From Unstructured Data using MDAActionable Intelligence From Unstructured Data using MDA
Actionable Intelligence From Unstructured Data using MDAProbal DasGupta
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
Situational Awareness for Smart Health
Situational Awareness for Smart HealthSituational Awareness for Smart Health
Situational Awareness for Smart HealthSupreet Oberoi
 
Configuring your network and Managing your Network
Configuring your network and Managing your Network Configuring your network and Managing your Network
Configuring your network and Managing your Network Daisyrie Cubio
 
Ammeon See OpenStack in Action
Ammeon  See OpenStack in ActionAmmeon  See OpenStack in Action
Ammeon See OpenStack in ActionAmmeon HR
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsVijay Karan
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim SheltonClear Technologies
 
Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016
Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016
Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016DevOpsDays Tel Aviv
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer securityKishor Datta Gupta
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESIJNSA Journal
 
SMACK on the Cloud
SMACK on the CloudSMACK on the Cloud
SMACK on the CloudRelevantz
 

Similar to Analysis: Guidelines for Securing WLANS and Networks of ‘Things’ (20)

Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet TracerPerformance Evaluation of a Network Using Simulation Tools or Packet Tracer
Performance Evaluation of a Network Using Simulation Tools or Packet Tracer
 
Torry Harris API and Application Integration Governance Framework
Torry Harris API and Application Integration Governance FrameworkTorry Harris API and Application Integration Governance Framework
Torry Harris API and Application Integration Governance Framework
 
ambient-computing
ambient-computingambient-computing
ambient-computing
 
Actionable Intelligence From Unstructured Data using MDA
Actionable Intelligence From Unstructured Data using MDAActionable Intelligence From Unstructured Data using MDA
Actionable Intelligence From Unstructured Data using MDA
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Soft computing
Soft computingSoft computing
Soft computing
 
Situational Awareness for Smart Health
Situational Awareness for Smart HealthSituational Awareness for Smart Health
Situational Awareness for Smart Health
 
Configuring your network and Managing your Network
Configuring your network and Managing your Network Configuring your network and Managing your Network
Configuring your network and Managing your Network
 
Operating system
Operating systemOperating system
Operating system
 
Ammeon See OpenStack in Action
Ammeon  See OpenStack in ActionAmmeon  See OpenStack in Action
Ammeon See OpenStack in Action
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 
Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016
Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016
Event-driven Infrastructure - Mike Place, SaltStack - DevOpsDays Tel Aviv 2016
 
Machine learning in computer security
Machine learning in computer securityMachine learning in computer security
Machine learning in computer security
 
Dataminng
DataminngDataminng
Dataminng
 
Z26167171
Z26167171Z26167171
Z26167171
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
SMACK on the Cloud
SMACK on the CloudSMACK on the Cloud
SMACK on the Cloud
 

More from Nicole Gaehle, MSIST

Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareNicole Gaehle, MSIST
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardNicole Gaehle, MSIST
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperNicole Gaehle, MSIST
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityNicole Gaehle, MSIST
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Nicole Gaehle, MSIST
 
Understanding Layering and Ethernet
Understanding Layering and EthernetUnderstanding Layering and Ethernet
Understanding Layering and EthernetNicole Gaehle, MSIST
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismNicole Gaehle, MSIST
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentationNicole Gaehle, MSIST
 

More from Nicole Gaehle, MSIST (19)

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
 
Database: PC and Employee
Database: PC and EmployeeDatabase: PC and Employee
Database: PC and Employee
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Understanding TCP and HTTP
Understanding TCP and HTTP Understanding TCP and HTTP
Understanding TCP and HTTP
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)
 
Understanding Layering and Ethernet
Understanding Layering and EthernetUnderstanding Layering and Ethernet
Understanding Layering and Ethernet
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
 
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber TerrorismAnalysis: New Threats & Countermeasure in Crime and Cyber Terrorism
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
 
Cryptography
CryptographyCryptography
Cryptography
 
Networking Task
Networking Task Networking Task
Networking Task
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Analysis: Guidelines for Securing WLANS and Networks of ‘Things’

  • 1. IS 3868 Nicole Gaehle Assignment 2 Analysis: Guidelines for Securing WLANS and Networks of ‘Things’ There are securityconcernsthatorganizationsshouldconsiderwhensecuringlocal area networksandespecially,wirelesslocal areanetworks.“Organizationsshouldhave standardizedsecurity configurationsfortheircommonWLAN components,suchasclientdevicesandAPs.A standardized configurationprovidesabase level of security,reducingvulnerabilitiesandlesseningthe impactof successful attacks.Standardizedconfigurationuse improvesthe consistencyandpredictabilityof security,inconjunctionwithusertrainingandawarenessactivitiesandothersupportingsecurity controls.”(Souppaya&Scarfone,2012) Local AreaNetworksare wirednetworksthatcanbe easily accessedif someone onthe WirelessLocal AreaNetworkfoundabackdoorto getintoit. For example, UMSL has a Local AreaNetworkoncampus that iswiredbuttheyalsohave the WirelessLocal Area Networkthatistiedoff the Local AreaNetwork.UMSL wouldhave hadto take into considerationon whatto do whentheyfirst setup theirinternetwhenfirstbeingbuilt.The components of the network wouldhave hadto be standardizedtoallow studentsbe able togaininternetaccessbutwouldnotallow themto sneakintothe backdoorof the networktoput a virusonto the network.ThroughoutUMSL campusthere are APs(AccessPoints) thatwouldhave beenconfiguredtoallow certainpacketsof data inand to blockcertainpacketsof data tobe clearedorviewedbeforebeingable tobe used.The standardizationsecuritywasused campus-wide tobe able toallow studentsandprofessorstogetinto the network.“Before designingaWLAN securityarchitecture orWLAN componentsecurity configurations,anorganizationshouldgatherinformationonneeds,particularlyoperational and securityones.”(Souppaya&Scarfone,2012) The IT networkteamof UMSL wouldhave neededto gatheras much entail aspossible tobe able todetermine whatkindof architecture theyare needingto buildfortheirlocal areanetworkandwirelesslocal areanetwork.Particularlythe wirelesslocal area networkbecause thatisthe most commonuse forsuch a large campus. “WhenplanningWLAN security, configurationdesignersshouldconsiderthe securitynotonlyof the WLAN itself butalsohow itmay affectothernetworksthatare accessible throughit,suchas internal wirednetworksreachable fromthe WLAN.An importantprincipleof WLAN securityistoseparate WLANswithdifferentsecurityprofiles.” (Souppaya&Scarfone,2012) UMSLs configurationdesignersintheirnetworkteamwouldhave needed to come up witha designthatwouldworkand implementagoodnetworkstrengthfortheirstudents and facultytobe able touse LANs andWLANs.Most campuscomputersare wiredbuttheyalsoneeded the wirelesslocal areanetworksofacultyandstudentswhouse theirowncomputerscouldconnectto the internet.UMSL needs tomeetthe needsof all studentsandfacultysotheycan use the internetfor classesbeingtaughtortakenfor a degree.The securityneededneedstobe a standardized configurationforLANsandWLANs. LANsand WLANsare technicallypartof Networksof ‘Things’.“’Things’canoccur inphysical space or virtual space.”(Voas,2016) Physical andvirtual space islike anygeneral commonknowledge that youcan thinkof. So physical isconsideredtobe like humans,vehicles,computers,etc.Virtual is consideredtobe like software,cloudservice,files,social medialikeFacebook,etc.“The primitivesof a NoT are:1) sensor,2) aggregator,3) communicationchannel,4) eUtility,and5) decisiontrigger.There may be some NoTsthat doesnot containall of these,butthat will be rare.” (Voas,2016) For instance, we all have primitivesthatmake us be whowe are. We are similartocomputers,software,andsocial media.“Sensorisanelectronicutility thatmeasuresphysical propertiessuchastemperature, acceleration,weight,sound,location,presence,identity,etc.” (Voas,2016) We all have a physical
  • 2. IS 3868 Nicole Gaehle appearance thatsomeone canassume weight,temperature (anger/sad), where we are,andhow we presentourselves.However, the temperature canbe anythinglike how madwe are,how sad we are,or evenourphysical temperature totell how sickwe are.“Aggregatorisa software implementationbased on mathematical function(s) thattransformsgroupsof raw data intointermediate,aggregateddata.” (Voas,2016) Inhis instance,ahumanis nota greatexample. Instead,thinkof acalculatorona computer or a regularcalculator.Forsomeone touse a calculatorit ismade of functionslikeadding,subtracting, dividing,square rooting,squaring,etc.A calculatorisa software-baseddevicethattakesfunctionsand takesraw data that we inputandcalculatesan answerforus.For example,2plus8 divided by2would getyou the answerof 2. “CommunicationChannel isamediumbywhichdataistransmitted(e.g., physical USB,wireless,wired,verbal,etc.).” (Voas,2016) We all have to communicate toa computer somehowaswell as to anotherindividual.Toprocessthe communicationtoa computeristo inputa USB to pull up filesortoenterwords(as I am usinghere) butthe computerisrecognizingthisasbinary (bytes) data. “AneUtility(external utility) isasoftware orhardware productor service.”(Voas,2016) A computerisa piece of hardware thatprovidesaservice toeducatorsandemployerstobe able to communicate topeople.“A decisiontriggercreatesthe final result(s) neededtosatisfythe purpose, specification,andrequirementsof aspecificNoT.” (Voas,2016) A specificNoT(Networkof ‘Things’) wouldbe a computer.Thisdocumentisan example of adecisiontrigger.Thisisdue tothat fact that the software inmycomputeriscomputingdata andallowingme tosee the endresult(final result) of the paper.Withouta computer,we wouldneedtouse a standardtypewriterthatmakesyouphysically move to the nextrowon the piece of paper.Thissoftware onthe eUtilityallowsustoeliminate the original typewriterandallowsof acommandto go the nextline of the document. “NoTscanbe open, closed,orsomewhere inbetween.” (Voas,2016) For example,acomputerhashundredsof sensors, numerousharddrives,aCPU or more,wiredcommunication,databases,andwithoutanywired connectiontoa network.Thiswouldbe consideredan in-betweenstate of openandclosed. In conclusion,NoTsandWLANsare similartoone another.Theyneed tobe configuredtobe secure to the usersof those services.Thiscanbe anywhere yougo.It can be at a restaurant,yourhouse, the library,a car shop,schools,etc.A standardizedsecurityconfigurationisbestusednomatterwhere yougo. Bibliography Dawson,M., & Omar, M. (2015). NewThreats and Countermeasurein Digital Crime and CyberTerrorism. Hershey:InformationScience Reference (animprintof IGIGlobal). Souppaya,M., & Scarfone,K.(2012). GuidlinesforSecuringWirelessLocal AreaNetworks(WLANs). NIST Special Publication 800-153. Voas,J. (2016). Networksof 'Things'. NISTSpecial Publication 800-183.