09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

integrity and availability are the characteristics used in risk assessment to evaluate the<br />

security measures implemented and its effectiveness (Stanley, 2002).<br />

5.3 Suitability <strong>of</strong> Applications to Businesses<br />

The businesses in Auckland CBD compromise <strong>of</strong> small medium enterprises (SME) and<br />

enterprises. This section will discuss on the suitability <strong>of</strong> the applications mentioned<br />

previously to small businesses and the enterprise.<br />

5.3.1 Small Businesses<br />

SME could be a one-man operated or a company with less than 250 employees (Levy,<br />

Powell, & Worrall, 2005). SME usually have a small budget on IT implementation and<br />

maintenance. Considering this factor, it may be impractical for SME to implement all<br />

<strong>of</strong> the WLAN security recommendations suggested previously. However, SME should<br />

implement the WEP or WPA encryption, change or disable the SSID, and perform<br />

MAC address filtering immediately if they have not done so. Commercial simulation<br />

s<strong>of</strong>tware can be very expensive and may be beyond the IT budget for most SME while<br />

an open source version may be hard to use, so this is a solution that may not be practical<br />

for SME with limited budget and IT knowledge. A company with IT staffs could start<br />

doing the risk assessment analysis to identify any loopholes in their current WLAN.<br />

The assessment data could further be used to evaluate whether implementing the IDS<br />

and VPN is necessary. For SME without IT staffs, it is advisable for them to hire a<br />

network consultant to evaluate the security level <strong>of</strong> WLAN in their company.<br />

5.3.2 Enterprise<br />

For the enterprises without any limitation on budget and IT staffs, they could implement<br />

all <strong>of</strong> the recommended security solutions except for MAC address filtering. MAC<br />

address filtering is impractical in company with a huge number <strong>of</strong> users due to<br />

extensive labor required to key in each <strong>of</strong> MAC address to the AP systems.<br />

Management <strong>of</strong> the MAC address is tedious therefore impractical for enterprises.<br />

5.4 Summary<br />

There are many ways to ensure the security <strong>of</strong> WLAN. This chapter provides seven<br />

recommendations that can be applied by business WLAN users to safeguard their<br />

network. The solutions suggested are enabling WEP or WPA encryption, changing the<br />

default SSID, implementing MAC address filtering, applying intrusion detection<br />

systems, utilizing the network simulation technique, and finally performing security<br />

41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!