AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 5<br />
Recommendations<br />
5.1 Introduction<br />
The result <strong>of</strong> the field trials conducted at Auckland CBD in 2007 is discussed in Chapter<br />
4. This chapter now suggests techniques that can be employed by individuals and<br />
businesses to secure their WLAN in the future. The first part <strong>of</strong> this chapter is a<br />
discussion on the security techniques available for WLAN. There are many security<br />
techniques that businesses can execute to ensure the security <strong>of</strong> their WLAN. The<br />
techniques that are discussed in this chapter are the enabling <strong>of</strong> WEP or WPA, the MAC<br />
address filtering, the virtual private network (VPN), the intrusion detection system<br />
(IDS), network simulation, and the security risk assessment. The second part <strong>of</strong> this<br />
chapter is a discussion on the suitability <strong>of</strong> the techniques discussed for individual,<br />
small business, and enterprise users.<br />
5.2 Recommendations<br />
5.2.1 Enable WEP or WPA<br />
Encryption can prevent malicious users from eavesdropping and stealing sensitive<br />
corporate information. Two major types <strong>of</strong> encryption protocol available on most<br />
wireless devices are WEP and WPA (McCullough, 2004). These protocols provide the<br />
first level <strong>of</strong> security to WLAN therefore it should be enabled in all wireless devices<br />
(Matsunaga, Merino, Suzuki, & Katz, 2003; Shridhar, Joyce, & Kolahi, 2005).<br />
36