09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5<br />

Recommendations<br />

5.1 Introduction<br />

The result <strong>of</strong> the field trials conducted at Auckland CBD in 2007 is discussed in Chapter<br />

4. This chapter now suggests techniques that can be employed by individuals and<br />

businesses to secure their WLAN in the future. The first part <strong>of</strong> this chapter is a<br />

discussion on the security techniques available for WLAN. There are many security<br />

techniques that businesses can execute to ensure the security <strong>of</strong> their WLAN. The<br />

techniques that are discussed in this chapter are the enabling <strong>of</strong> WEP or WPA, the MAC<br />

address filtering, the virtual private network (VPN), the intrusion detection system<br />

(IDS), network simulation, and the security risk assessment. The second part <strong>of</strong> this<br />

chapter is a discussion on the suitability <strong>of</strong> the techniques discussed for individual,<br />

small business, and enterprise users.<br />

5.2 Recommendations<br />

5.2.1 Enable WEP or WPA<br />

Encryption can prevent malicious users from eavesdropping and stealing sensitive<br />

corporate information. Two major types <strong>of</strong> encryption protocol available on most<br />

wireless devices are WEP and WPA (McCullough, 2004). These protocols provide the<br />

first level <strong>of</strong> security to WLAN therefore it should be enabled in all wireless devices<br />

(Matsunaga, Merino, Suzuki, & Katz, 2003; Shridhar, Joyce, & Kolahi, 2005).<br />

36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!