Monday, September 9, 2019
Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 words
Security Risk Mitigation Policies - Coursework Example The first option should involve different methods for making it more intricate to intercept and locate the wireless signals. This way, hackers will have a hard time locating the organizationââ¬â¢s signal. Additionally, the other principal option will involve utilization of encryption in order to preserve confidentiality even when the wireless signal gets intercepted (Choi et al., 2008). It will also be imperative for the organization to utilize signal-hiding techniques so as to properly intercept wireless transmissions. This is because for any attacker to successfully intrude into a wireless network, they will first need to locate and identify the wireless network. This will be achieved by utilizing numerous steps that will make it extremely difficult to locate the organizations wireless access point. Therefore, the company should include some of the easiest as well as least costly methods which include turning off the service set identifier (SSID) which broadcasts by wireless access points. This will not only make it hard for hackers to have no access, but also, it will make it hard for them to access the companyââ¬â¢s servers and download sensitive and personal materials. Moreover, assigning cryptic names to the SSIDs will also make it hard to access the organizations data. Additionally, reducing the organizationââ¬â¢s signal will provide requisite coverage.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.