SlideShare a Scribd company logo
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of
security because of hacking aspect, the wireless technology has
been under threat as the same as the wired network, but on the
other hand they are vulnerable to additional risk( Silva, Santos
& Nogueira,2015). The wireless network usually transmits data
via the radio frequencies that enhance the possibility of tapping
the information by threaten invaders if it is not properly
protected. The threaten invaders have founded a way to get the
access to the wireless system to steal or destroy the original
information, the attackers launch strikes which are related to
network bandwidth and prevent the authorized users to use their
desired services, and they also keep an eye on the conversations
that are taking place. For instance, the hackers or threaten
invaders successfully get into wireless systems to have access to
important information. The project mainly focuses on the
IEEE802.11 and IEEE802.16 which are group of standards for
wireless local area networks (WLANs) and metropolitan area
networks (WMANs) respectively.Overview of Wireless
Technologies
The wireless technologies make the gadgets to have
communication without any connection physically, implying
that they do not need peripheral or network cabling. The
wireless range from the complicated environments, for instance
mobile networks that includes 3G mobile phones and local area
networks, to less complicated gadgets such as microphones
without wire, earphones and other gadgets which will not save
or process data and usually used for small range procedures
like infrared or communications via Bluetooth (BT) (Egners,
Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote
controls and mice all needs a direct line of sight between the
receiver and transmitter to complete the link. Even though the
infrared communication replaced by BT technology in most of
the gadgets, some legacy standard gadgets still use IR for short
range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between
other wireless communications and the traditional wired
networks. Wireless network can be structured in different ways
but they are frequently categorized into 4 main categories based
on their coverage range.
· Wireless wide area network (WWAN)
Which involves wide are technologies for instance 2G which
includes general packet radio service and 3G cellular that
includes high speeds packet access.
· Wireless metropolitan area network (WMAN)
That represents wireless internet connection at broadband speed
in cities and is usually referred as wireless broadband. It haves
the technologies such as IEEE802.16 and the upcoming
standards such as mobile broadband wireless access.
· Wireless local area network (WLAN)
It involves Wi-Fi (802.111) and Hipper LAN and is a kind of
local area network in which information is carried through radio
waves which has high frequency instead of wires or
cables.Standards of Wireless Specification:
· The IEEE 802.15 standard is usually termed as Bluetooth. This
standard prompt low intricacy and small power connection,
perfect for close devices.
· IEEE 802.15 is a sub-standard that refer the requirements of
low sum wireless individual area nets or ZigBee. The ZigBee
has been developing the robotics of dynamism supervision,
building and home structure administration that comprises
heating, lighting, and refrigeration method and efficacy
observing.
· IEEE802.1x is a certain standard that defines a framework for
authentication and controlling user traffic to secure network,
handling and managing the different devices of the framework.
The 802.1X enhance many authentication methods.Security
Features
Security characteristics of WiMAX and Wi-Fi have been
created with secured measures measure to meet the standards
for secured transaction of wireless data. WiMAX technologies
incorporated the some of the features that are mentioned below
(Tepšić, Veinović & Uljarević, 2014).
Security features of IEEE802.11
The IEEE802.11 WLAN standard has established many services
to provide a secure operating environment. The recent ones are
WEP6, WPA7 andWPA28
· Wi-Fi protected access (WPA) it is a development on WEP is
WAP which was established in 2003. The WPA averts most
WEP’s susceptibilities and increases the ability of confirmation
and encryption (Chenoweth, Minch & Tabor, 2010). The Wi-Fi
security access 2 is an advancement one WPA, this further
increase the power of encryption with a space to utilize the
advanced encryption normal and improve key supervision
controls and authentication. The security features of
IEEE802.16
· It is has undergone tremendous review by information security
researcher to minimize any loophole in the security procedures
and implementation stipulated in the specification. The modern
802.16 security architecture involves the following protection
measures (Illiano, & Lupu, 2015).
· Privacy and key management
That gives a view on how the keys are managed securely in a
WiMAX gadget or at the time of interaction between key and
data. It offers security to keys which is important feature of
WiMAX network and its data which transmits
wirelessly.Wireless Threats
The wireless security risks are usually in three categories that
are identified in TISN wireless security: confidentiality,
integrity and availability. These properties should be understand
perfectly mis understanding those properties will cause
deployment errors choice those results to security (Chenoweth,
Minch & Tabor, 2010).
Improper configuration of wireless will make the
company standards low in security. Wireless devices are usually
designed in standard techniques and reduce security standards.
These threats will make the same attacks happen again includes
keeping an eye on conversation, recording the screen shots etc.
Any network system is suspected to attacks based on how a
system functions. Many of wireless systems use TCP/IP or other
communication methods, and any threat that can be performed
using the procedures will be possible on the wireless systems
(Silva, Santos & Nogueira, 2015). Now a days enhanced
security measures became a primary goal for any organization
tier design.Wireless Networks Attacks
Wireless networks have a great possibility to be attacked by the
attackers in all the possible ways like passively or actively. The
United States institute of standard and technology define 6
different kinds of attacks under categories for Wi-Fi
technology. These attacks are also applicable to wire network
that companies commonly use, whether mobile, fixed, and long
or short range.
· Passive attack: it is an attack in which an unauthorized person
has the access to an asset and does not modify its consent. The
passive attack can be either traffic analysis or eaves dropping.
· Active attack is whereby an authorized person makes changes
to a data, message, and file or data streams. The mechanism
used by active attacks is masquerading where attacker
impersonates an authorized person and thereby gets certain
unauthorized privileges.
· The active attackers also use replay to monitor transmissions
and retransmits messages as the authorized user. Message
modification is another method that active attackers use to alter
message by, adding, deleting and reordering. The active
attackers also employ aspect of denial of service that prevents
the authorized user or management of communication facilities
(Tepšić, Veinović & Uljarević, 2014).
Sample attacks for Wi-Fi networks
· Exploitation of firmware or software vulnerabilities in
wireless devices or networks.
· Denial of services, where there is overwhelming nodes with
much traffic. Disassociating wireless clients to frequently
disconnect from network.
· Cracking authentication procedures: some wireless login
protocols vulnerable to dictionary attacks and precipitation
attacks, this is where the malicious persons passively gets
wireless data exchanges, and then utilize the packets to decode
keys.Conclusion
The security on wireless technology is an issue in the modern
world because of hackers and malicious problems. The
standards are put in place to protect wireless threats. Wireless
network are only secure if all the standards and precaution are
meant and well configurations of wireless networks. Wireless
network are vulnerable to most of threats of wired network
References
· Egners, A., Herrmann, P., & Meyer, U. (2015). Multi-operator
wireless mesh networks secured by all-encompassing security
architecture. International Journal of Information Security,
14(2), 169-186. doi:10.1007/s10207-014-0244-y
· Silva, H., Santos, A., & Nogueira, M. (2015). Routing
management for performance and security tradeoff in wireless
mesh networks. International Journal Of Information Security,
14(1), 35-46. doi:10.1007/s10207-014-0246-9
· Sun, X., Yan, B., Zhang, X., & Rong, C. (2015). An Integrated
Intrusion Detection Model of Cluster-Based Wireless Sensor
Network. Plos ONE, 10(10), 1-16.
doi:10.1371/journal.pone.0139513
· Tepšić, D., Veinović, M., & Uljarević, D. (2014).
PERFORMANCE EVALUATION OF WPA2 SECURITY
PROTOCOL IN MODERN WIRELESS NETWORKS.
Singidunum Journal Of Applied Sciences, 600-605.
doi:10.15308/SInteZa-2014-600-605
Weekly tasks or assignments (Individual or Group Projects) will
be due byMonday and late submissions will be assigned a late
penalty in accordance with the late penalty policy found in the
syllabus. NOTE: All submission posting times are based on
midnight Central Time.
One of the first tasks in the execution of an information
technology project is to develop a research plan for the project.
Projects without a research plan are destined for failure, and the
development of a good plan will be instrumental in the success
of the project.
For this assignment, you will continue your work on the project
with the development of a research plan. The plan will include
details about the research and research methods planned for the
project. You will identify necessary hypotheses – statements
concerning what the problems are. Also describe how research
will be used to identify or confirm causal factors for the
problem(s) identified in the first week. Also describe how
research will help determine what the solutions might be. You
will discuss the resources that will be used to investigate the
problem, possible causes, and solutions.
The project deliverables are:
· Update your Information Technology Problem
Analysis document title page with a new date and project name.
· Update the previously completed sections based on instructor
feedback.
· New Content: Project Plan
· Research Methodology
· Prepare at least one hypothesis for your project. The
hypothesis should be well-formed for technical research
purposes.
· For each hypothesis, provide details describing how research
will be used to identify causal factors for the problem that you
identified in the Week 1 assignment.
· Discuss how data will be collected, measured, and analyzed to
prove or disprove the hypothesis.
· Be sure to update your Table of Contents before submission.
· Name the document "yourname_IT697_IP2.doc."
Please submit your assignment.
For assistance with your assignment, please use your text, Web
resources, and all course materials
Running head: IT PROBLEM ANALYSIS
1
IT PROBLEM ANALYSIS
2
CUSTOMER SERVICE: Corporate IT
IT PROBLEM ANALYSIS
Table of Contents
Project outline2
Problem Identification3
Project plan4
Project Execution4
Proposed
Solution
6
Current and Future Technology Trends7
References8
Project outline
Day by day the technology usage increases decade by decade
there is rapid growth immensely. This radical shift will have the
effect of changing the way we live, work and even think. World
over, banks are experiencing the struggle of finding a technical
answer to overcome the challenges of advanced change in
requirements of work environment. The project discusses how
customer service can negatively affect a corporate institution, in
this paper I choose to analyze the challenges facing Equity
Bank Limited as regards the customer service provisions. It is
imperative to state that the challenges that accrue from
computerization of their services are multi-pronged.
Banks are aware that customers’ needs new services and always
make plans to have the services available. With the periodic
increase of competence in IT field the customer’s needs to
update new technologies to remain in competition. Equity bank
has implemented the features to effectively address the radical
changes that have arisen in the banking sector.Problem
Identification
Customer satisfaction is a major problem that faces Information
technology. Customer services has a very bad reputation when it
comes to satisfaction of a client or customer’s needs, the bad
reputation can be said to be a well-deserved challenge. Often,
the work which is done incorrectly and not to the customers’
requirements, it therefore leaves the customer to determine what
is good customer service and what is not. I recently needed a
new hard drive to be installed on my computer and proceeded to
ask that my personal files should be removed from the old drive
and placed on the new drive, I received my computer back with
a new drive and a very hefty service fee but all the critical files
were missing. This turn of events took me aback and I was left
wondering what type of computer repair shop was that could not
accomplish my simple request.
Corporate IT faces similar challenges when it comes to its
customer service. Some level of truth is evident in the statement
that says, “A customer always needs to be told what they want.”
This may not often be the case when the tone used by the
computer expert comes out as an arrogant one. It is true to say
that a customer may pass out as an ignorant person but this does
not necessarily bring about the assumption that the customer is
stupid, without being economical with the truth; this is hardly
the case, as the customers also do not like to be treated as such.
The challenge that is created by this case scenario is that can
always be solved by improving customer care services by taking
into keen consideration what the client needs and addressing
them promptly.
An analogy of this case is applicable to the banking sector, take
for instance a customer at equity bank limited needs to have his
or her signature changed. The banks procedure is such that the
client will be asked to append their signature on a piece of
paper for a verification to be done by the attending customer
care agent. If the customer care agent is not professional enough
they will in-turn refer the client to the branch where they
opened their account, by so doing it only means that the
customer care agent does not have requisite training to handle
the IT infrastructure at his disposal. The same procedure a
client is being sent to do at his primary branch can be done by
the agent and the feedback channeled to the clients primary
bank branch for any verifications, if any.Project plan
Now that the problem has been identified, the whole idea of a
project plan is to plan an intervention, the projects goal and the
core benefits that accrue to solving the problem, the long-term
benefits to the target audience also is discussed here in
lengthProject Execution
Key to any company is customer service. The bank in trying to
incorporate features that customers are expecting is also aware
that if they are not able to satisfy the customers that will spread
through the social media which impacts the business very badly.
To execute the project efficiently, it is imperative that the bank
better understands the customer process management, a good
review and a satisfied customer will acts as catalyst for
company growth without the involvement of the company, I
outline couple of practical, actionable steps that IT can adopt to
execute its mandate.
a) Understanding the customers
Every customer needs a satisfied service that they will have
with the bank and over any communication channel that they
may choose to use. Empirical research shows that customer
demographics affect channel preference, with the younger
generation being much comfortable using communications such
as chat.
b) Empowering customer service agents with good information
Customer service systems should not only incorporate the front
end of a database of customer information and cases. The agents
ought to be integrated with back office applications for easy
retrieval of answers to questions in real-time, such questions
can include when and what time an order was shipped. The
customer history can be studied from decision strategy which
happens only when a customer system is integrated with the IT.
The banks IT department can deliver an integrated sales and
customer service which can allow agents to quickly access and
retrieve client sales data, orders and even discount levels.
c) Focusing on the agent experience
Agents and customer care personnel normally use approximately
20 different applications during their workday; they also
typically do not follow the same discovery pattern leaving each
agent with the choice to follow their own discovery path, the
efficiency with which each agent offers services will greatly
vary due to this fact, the services rendered will therefore be
inconsistent. I suggest that one workable solution for the IT
department is the application of the power of business process
management to their customer service tools. IT can assist
service managers to create repeatable business processes that
use visual modelling tools geared to the business users. This
strategy has been employed by an international bank when the
managers realized that it was because of their poor customer
satisfaction scores that resulted to its service agents in its 23
contact centers following different operational processes. The
adoption of process-driven agent desktop by agents at Equity
bank will improve first contact resolution by at least 30%
Proposed

More Related Content

Similar to 1Table of Contents.docx

The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
Thesis Scientist Private Limited
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
IJAEMSJORNAL
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
IJNSA Journal
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
IJNSA Journal
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
IJNSA Journal
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
Wireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedWireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explained
David Sweigert
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
Dustin Pytko
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 

Similar to 1Table of Contents.docx (20)

The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Wireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedWireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explained
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 

More from felicidaddinwoodie

Business UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxBusiness UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docx
felicidaddinwoodie
 
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxBusiness UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
felicidaddinwoodie
 
Business UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxBusiness UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docx
felicidaddinwoodie
 
Business System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxBusiness System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docx
felicidaddinwoodie
 
Business StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxBusiness StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docx
felicidaddinwoodie
 
Business StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxBusiness StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docx
felicidaddinwoodie
 
Business Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxBusiness Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docx
felicidaddinwoodie
 
Business Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxBusiness Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docx
felicidaddinwoodie
 
Business RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxBusiness RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docx
felicidaddinwoodie
 
Business ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxBusiness ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docx
felicidaddinwoodie
 
Business ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxBusiness ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docx
felicidaddinwoodie
 
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxBUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
felicidaddinwoodie
 
Business Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxBusiness Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docx
felicidaddinwoodie
 
Business Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxBusiness Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docx
felicidaddinwoodie
 
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxBusiness Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
felicidaddinwoodie
 
Business PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxBusiness PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docx
felicidaddinwoodie
 
Business Planning and Program Planning A strategic plan.docx
Business Planning and Program Planning          A strategic plan.docxBusiness Planning and Program Planning          A strategic plan.docx
Business Planning and Program Planning A strategic plan.docx
felicidaddinwoodie
 
Business Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxBusiness Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docx
felicidaddinwoodie
 
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxBusiness Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
felicidaddinwoodie
 
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxBUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
felicidaddinwoodie
 

More from felicidaddinwoodie (20)

Business UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxBusiness UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docx
 
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxBusiness UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
 
Business UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxBusiness UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docx
 
Business System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxBusiness System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docx
 
Business StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxBusiness StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docx
 
Business StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxBusiness StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docx
 
Business Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxBusiness Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docx
 
Business Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxBusiness Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docx
 
Business RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxBusiness RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docx
 
Business ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxBusiness ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docx
 
Business ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxBusiness ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docx
 
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxBUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
 
Business Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxBusiness Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docx
 
Business Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxBusiness Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docx
 
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxBusiness Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
 
Business PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxBusiness PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docx
 
Business Planning and Program Planning A strategic plan.docx
Business Planning and Program Planning          A strategic plan.docxBusiness Planning and Program Planning          A strategic plan.docx
Business Planning and Program Planning A strategic plan.docx
 
Business Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxBusiness Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docx
 
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxBusiness Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
 
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxBUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

1Table of Contents.docx

  • 1. 1 Table of Contents Wireless Network Security3 Introduction3 Overview of Wireless Technologies4 Standards of Wireless Specification:6 Security Features6 Wireless Threats7 Wireless Networks Attacks8 Conclusion9 References10
  • 2. Wireless Network SecurityIntroduction The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save
  • 3. or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015). Typical IP network wireless devices or infrastructure Access points or base stations · Station wireless · Router wireless Retransmission devices (Sun, Yan, Zhang & Rong, 2015). · Repeater wireless · Network bridge wireless End points · Cards or adapters wireless · Laptops · PDAs · Mobile telephones Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015). Network classification of wireless networks Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range. · Wireless wide area network (WWAN) Which involves wide are technologies for instance 2G which includes general packet radio service and 3G cellular that includes high speeds packet access. · Wireless metropolitan area network (WMAN) That represents wireless internet connection at broadband speed in cities and is usually referred as wireless broadband. It haves the technologies such as IEEE802.16 and the upcoming
  • 4. standards such as mobile broadband wireless access. · Wireless local area network (WLAN) It involves Wi-Fi (802.111) and Hipper LAN and is a kind of local area network in which information is carried through radio waves which has high frequency instead of wires or cables.Standards of Wireless Specification: · The IEEE 802.15 standard is usually termed as Bluetooth. This standard prompt low intricacy and small power connection, perfect for close devices. · IEEE 802.15 is a sub-standard that refer the requirements of low sum wireless individual area nets or ZigBee. The ZigBee has been developing the robotics of dynamism supervision, building and home structure administration that comprises heating, lighting, and refrigeration method and efficacy observing. · IEEE802.1x is a certain standard that defines a framework for authentication and controlling user traffic to secure network, handling and managing the different devices of the framework. The 802.1X enhance many authentication methods.Security Features Security characteristics of WiMAX and Wi-Fi have been created with secured measures measure to meet the standards for secured transaction of wireless data. WiMAX technologies incorporated the some of the features that are mentioned below (Tepšić, Veinović & Uljarević, 2014). Security features of IEEE802.11 The IEEE802.11 WLAN standard has established many services to provide a secure operating environment. The recent ones are WEP6, WPA7 andWPA28 · Wi-Fi protected access (WPA) it is a development on WEP is WAP which was established in 2003. The WPA averts most WEP’s susceptibilities and increases the ability of confirmation and encryption (Chenoweth, Minch & Tabor, 2010). The Wi-Fi security access 2 is an advancement one WPA, this further
  • 5. increase the power of encryption with a space to utilize the advanced encryption normal and improve key supervision controls and authentication. The security features of IEEE802.16 · It is has undergone tremendous review by information security researcher to minimize any loophole in the security procedures and implementation stipulated in the specification. The modern 802.16 security architecture involves the following protection measures (Illiano, & Lupu, 2015). · Privacy and key management That gives a view on how the keys are managed securely in a WiMAX gadget or at the time of interaction between key and data. It offers security to keys which is important feature of WiMAX network and its data which transmits wirelessly.Wireless Threats The wireless security risks are usually in three categories that are identified in TISN wireless security: confidentiality, integrity and availability. These properties should be understand perfectly mis understanding those properties will cause deployment errors choice those results to security (Chenoweth, Minch & Tabor, 2010). Improper configuration of wireless will make the company standards low in security. Wireless devices are usually designed in standard techniques and reduce security standards. These threats will make the same attacks happen again includes keeping an eye on conversation, recording the screen shots etc. Any network system is suspected to attacks based on how a system functions. Many of wireless systems use TCP/IP or other communication methods, and any threat that can be performed using the procedures will be possible on the wireless systems (Silva, Santos & Nogueira, 2015). Now a days enhanced security measures became a primary goal for any organization tier design.Wireless Networks Attacks Wireless networks have a great possibility to be attacked by the
  • 6. attackers in all the possible ways like passively or actively. The United States institute of standard and technology define 6 different kinds of attacks under categories for Wi-Fi technology. These attacks are also applicable to wire network that companies commonly use, whether mobile, fixed, and long or short range. · Passive attack: it is an attack in which an unauthorized person has the access to an asset and does not modify its consent. The passive attack can be either traffic analysis or eaves dropping. · Active attack is whereby an authorized person makes changes to a data, message, and file or data streams. The mechanism used by active attacks is masquerading where attacker impersonates an authorized person and thereby gets certain unauthorized privileges. · The active attackers also use replay to monitor transmissions and retransmits messages as the authorized user. Message modification is another method that active attackers use to alter message by, adding, deleting and reordering. The active attackers also employ aspect of denial of service that prevents the authorized user or management of communication facilities (Tepšić, Veinović & Uljarević, 2014). Sample attacks for Wi-Fi networks · Exploitation of firmware or software vulnerabilities in wireless devices or networks. · Denial of services, where there is overwhelming nodes with much traffic. Disassociating wireless clients to frequently disconnect from network. · Cracking authentication procedures: some wireless login protocols vulnerable to dictionary attacks and precipitation attacks, this is where the malicious persons passively gets wireless data exchanges, and then utilize the packets to decode keys.Conclusion The security on wireless technology is an issue in the modern world because of hackers and malicious problems. The standards are put in place to protect wireless threats. Wireless
  • 7. network are only secure if all the standards and precaution are meant and well configurations of wireless networks. Wireless network are vulnerable to most of threats of wired network References · Egners, A., Herrmann, P., & Meyer, U. (2015). Multi-operator wireless mesh networks secured by all-encompassing security architecture. International Journal of Information Security, 14(2), 169-186. doi:10.1007/s10207-014-0244-y · Silva, H., Santos, A., & Nogueira, M. (2015). Routing management for performance and security tradeoff in wireless mesh networks. International Journal Of Information Security, 14(1), 35-46. doi:10.1007/s10207-014-0246-9 · Sun, X., Yan, B., Zhang, X., & Rong, C. (2015). An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network. Plos ONE, 10(10), 1-16. doi:10.1371/journal.pone.0139513 · Tepšić, D., Veinović, M., & Uljarević, D. (2014). PERFORMANCE EVALUATION OF WPA2 SECURITY PROTOCOL IN MODERN WIRELESS NETWORKS. Singidunum Journal Of Applied Sciences, 600-605. doi:10.15308/SInteZa-2014-600-605 Weekly tasks or assignments (Individual or Group Projects) will be due byMonday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time. One of the first tasks in the execution of an information technology project is to develop a research plan for the project. Projects without a research plan are destined for failure, and the development of a good plan will be instrumental in the success of the project. For this assignment, you will continue your work on the project
  • 8. with the development of a research plan. The plan will include details about the research and research methods planned for the project. You will identify necessary hypotheses – statements concerning what the problems are. Also describe how research will be used to identify or confirm causal factors for the problem(s) identified in the first week. Also describe how research will help determine what the solutions might be. You will discuss the resources that will be used to investigate the problem, possible causes, and solutions. The project deliverables are: · Update your Information Technology Problem Analysis document title page with a new date and project name. · Update the previously completed sections based on instructor feedback. · New Content: Project Plan · Research Methodology · Prepare at least one hypothesis for your project. The hypothesis should be well-formed for technical research purposes. · For each hypothesis, provide details describing how research will be used to identify causal factors for the problem that you identified in the Week 1 assignment. · Discuss how data will be collected, measured, and analyzed to prove or disprove the hypothesis. · Be sure to update your Table of Contents before submission. · Name the document "yourname_IT697_IP2.doc." Please submit your assignment. For assistance with your assignment, please use your text, Web resources, and all course materials Running head: IT PROBLEM ANALYSIS 1 IT PROBLEM ANALYSIS 2
  • 9. CUSTOMER SERVICE: Corporate IT IT PROBLEM ANALYSIS Table of Contents Project outline2 Problem Identification3 Project plan4 Project Execution4 Proposed Solution 6 Current and Future Technology Trends7 References8 Project outline Day by day the technology usage increases decade by decade there is rapid growth immensely. This radical shift will have the effect of changing the way we live, work and even think. World over, banks are experiencing the struggle of finding a technical answer to overcome the challenges of advanced change in requirements of work environment. The project discusses how customer service can negatively affect a corporate institution, in this paper I choose to analyze the challenges facing Equity
  • 10. Bank Limited as regards the customer service provisions. It is imperative to state that the challenges that accrue from computerization of their services are multi-pronged. Banks are aware that customers’ needs new services and always make plans to have the services available. With the periodic increase of competence in IT field the customer’s needs to update new technologies to remain in competition. Equity bank has implemented the features to effectively address the radical changes that have arisen in the banking sector.Problem Identification Customer satisfaction is a major problem that faces Information technology. Customer services has a very bad reputation when it comes to satisfaction of a client or customer’s needs, the bad reputation can be said to be a well-deserved challenge. Often, the work which is done incorrectly and not to the customers’ requirements, it therefore leaves the customer to determine what is good customer service and what is not. I recently needed a new hard drive to be installed on my computer and proceeded to ask that my personal files should be removed from the old drive and placed on the new drive, I received my computer back with a new drive and a very hefty service fee but all the critical files were missing. This turn of events took me aback and I was left wondering what type of computer repair shop was that could not accomplish my simple request. Corporate IT faces similar challenges when it comes to its
  • 11. customer service. Some level of truth is evident in the statement that says, “A customer always needs to be told what they want.” This may not often be the case when the tone used by the computer expert comes out as an arrogant one. It is true to say that a customer may pass out as an ignorant person but this does not necessarily bring about the assumption that the customer is stupid, without being economical with the truth; this is hardly the case, as the customers also do not like to be treated as such. The challenge that is created by this case scenario is that can always be solved by improving customer care services by taking into keen consideration what the client needs and addressing them promptly. An analogy of this case is applicable to the banking sector, take for instance a customer at equity bank limited needs to have his or her signature changed. The banks procedure is such that the client will be asked to append their signature on a piece of paper for a verification to be done by the attending customer care agent. If the customer care agent is not professional enough they will in-turn refer the client to the branch where they opened their account, by so doing it only means that the customer care agent does not have requisite training to handle the IT infrastructure at his disposal. The same procedure a client is being sent to do at his primary branch can be done by the agent and the feedback channeled to the clients primary bank branch for any verifications, if any.Project plan
  • 12. Now that the problem has been identified, the whole idea of a project plan is to plan an intervention, the projects goal and the core benefits that accrue to solving the problem, the long-term benefits to the target audience also is discussed here in lengthProject Execution Key to any company is customer service. The bank in trying to incorporate features that customers are expecting is also aware that if they are not able to satisfy the customers that will spread through the social media which impacts the business very badly. To execute the project efficiently, it is imperative that the bank better understands the customer process management, a good review and a satisfied customer will acts as catalyst for company growth without the involvement of the company, I outline couple of practical, actionable steps that IT can adopt to execute its mandate. a) Understanding the customers Every customer needs a satisfied service that they will have with the bank and over any communication channel that they may choose to use. Empirical research shows that customer demographics affect channel preference, with the younger generation being much comfortable using communications such as chat. b) Empowering customer service agents with good information Customer service systems should not only incorporate the front end of a database of customer information and cases. The agents
  • 13. ought to be integrated with back office applications for easy retrieval of answers to questions in real-time, such questions can include when and what time an order was shipped. The customer history can be studied from decision strategy which happens only when a customer system is integrated with the IT. The banks IT department can deliver an integrated sales and customer service which can allow agents to quickly access and retrieve client sales data, orders and even discount levels. c) Focusing on the agent experience Agents and customer care personnel normally use approximately 20 different applications during their workday; they also typically do not follow the same discovery pattern leaving each agent with the choice to follow their own discovery path, the efficiency with which each agent offers services will greatly vary due to this fact, the services rendered will therefore be inconsistent. I suggest that one workable solution for the IT department is the application of the power of business process management to their customer service tools. IT can assist service managers to create repeatable business processes that use visual modelling tools geared to the business users. This strategy has been employed by an international bank when the managers realized that it was because of their poor customer satisfaction scores that resulted to its service agents in its 23 contact centers following different operational processes. The adoption of process-driven agent desktop by agents at Equity
  • 14. bank will improve first contact resolution by at least 30% Proposed