AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
computer systems (Engelenhoven, 1998). Considering all the factor discussed<br />
previously, simulation is an important tool in the analysis, design and studies <strong>of</strong> WLAN<br />
(Bhatt, Fujimoto, Ogielski, & Perumalla, 1998; Breslau et al., 2000; Goktruk, 2006;<br />
Nieuwelaar & Hunt, 2004). A summary <strong>of</strong> the available network simulators is in<br />
Appendix 2.<br />
5.2.7 Perform Security Risk Assessment<br />
Security <strong>of</strong> information is <strong>of</strong> vital importance to organizations which use wireless local<br />
area networks. If these WLANs are left vulnerable, organizations are risking themselves<br />
<strong>of</strong> security threats that may caused severe damages to the company’s operation (Dyce &<br />
Barrett, 2006). In spite <strong>of</strong> its size, a wireless network requires a through evaluation <strong>of</strong><br />
its physical and operational security. Attackers can exploit the weaknesses that exist in<br />
WLAN to gain access to it. A way to protect the corporate WLAN is to reduce,<br />
mitigate or remove the threat risks. This can be achieved by having a good risk<br />
management program (Myerson, 2002).<br />
In the long run, risk assessment can help organization avoids heavy financial losses due<br />
compromised security measures, protect against breaches <strong>of</strong> privacy, and finally protect<br />
the company from exposing themselves to cyber risks (Landoll, 2006). There are<br />
several benefits <strong>of</strong> conducting risk assessment to WLAN by organizations. The first<br />
benefit is the check and balance where the organization can review the current status <strong>of</strong><br />
WLAN security measures implemented in the company. The second benefit <strong>of</strong> risk<br />
assessment is that it provides a periodic review on the effectiveness <strong>of</strong> security<br />
measures and threats that may occur as the WLAN technology advances and changes.<br />
The third benefit, organization can use the data gathered from risk assessment to plan<br />
and budget their spending on security implementation. The forth benefit is it creates<br />
security awareness among WLAN users and implementers (Landoll, 2006).<br />
At an organizational level, risk assessments could be expected to be part <strong>of</strong> the normal<br />
security protocols to protect overall wireless network. Corporate users must be aware<br />
that the security requirement for wired and wireless network varies slightly.<br />
Implementing WLAN requires proper authentication <strong>of</strong> every network user, which is<br />
sometimes not required in wired LAN. WLANs also have to deal with providing and<br />
ensuring signals coverage and mobility to users. The confidentiality, authenticity,<br />
40