09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

computer systems (Engelenhoven, 1998). Considering all the factor discussed<br />

previously, simulation is an important tool in the analysis, design and studies <strong>of</strong> WLAN<br />

(Bhatt, Fujimoto, Ogielski, & Perumalla, 1998; Breslau et al., 2000; Goktruk, 2006;<br />

Nieuwelaar & Hunt, 2004). A summary <strong>of</strong> the available network simulators is in<br />

Appendix 2.<br />

5.2.7 Perform Security Risk Assessment<br />

Security <strong>of</strong> information is <strong>of</strong> vital importance to organizations which use wireless local<br />

area networks. If these WLANs are left vulnerable, organizations are risking themselves<br />

<strong>of</strong> security threats that may caused severe damages to the company’s operation (Dyce &<br />

Barrett, 2006). In spite <strong>of</strong> its size, a wireless network requires a through evaluation <strong>of</strong><br />

its physical and operational security. Attackers can exploit the weaknesses that exist in<br />

WLAN to gain access to it. A way to protect the corporate WLAN is to reduce,<br />

mitigate or remove the threat risks. This can be achieved by having a good risk<br />

management program (Myerson, 2002).<br />

In the long run, risk assessment can help organization avoids heavy financial losses due<br />

compromised security measures, protect against breaches <strong>of</strong> privacy, and finally protect<br />

the company from exposing themselves to cyber risks (Landoll, 2006). There are<br />

several benefits <strong>of</strong> conducting risk assessment to WLAN by organizations. The first<br />

benefit is the check and balance where the organization can review the current status <strong>of</strong><br />

WLAN security measures implemented in the company. The second benefit <strong>of</strong> risk<br />

assessment is that it provides a periodic review on the effectiveness <strong>of</strong> security<br />

measures and threats that may occur as the WLAN technology advances and changes.<br />

The third benefit, organization can use the data gathered from risk assessment to plan<br />

and budget their spending on security implementation. The forth benefit is it creates<br />

security awareness among WLAN users and implementers (Landoll, 2006).<br />

At an organizational level, risk assessments could be expected to be part <strong>of</strong> the normal<br />

security protocols to protect overall wireless network. Corporate users must be aware<br />

that the security requirement for wired and wireless network varies slightly.<br />

Implementing WLAN requires proper authentication <strong>of</strong> every network user, which is<br />

sometimes not required in wired LAN. WLANs also have to deal with providing and<br />

ensuring signals coverage and mobility to users. The confidentiality, authenticity,<br />

40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!