09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 3 RESEARCH METHODOLOGY 21<br />

3.1 INTRODUCTION 21<br />

3.2 PURPOSE OF RESEARCH 21<br />

3.3 GOAL 22<br />

3.4 THE HYPOTHESIS 22<br />

3.5 RESEARCH DESIGN 22<br />

3.5.1 Location 22<br />

3.5.2 Field Trials 23<br />

3.5.3 Method 24<br />

3.5.4 Resources Required 24<br />

3.6 DATA ANALYSIS CONSIDERATIONS 25<br />

3.6.1 Operation Mode 25<br />

3.6.2 Encryption Status 25<br />

3.6.3 SSID 26<br />

3.7 SUMMARY 26<br />

CHAPTER 4 RESULTS AND ANALYSIS 27<br />

4.1 INTRODUCTION 27<br />

4.2 EXPERIMENTAL RESULTS 27<br />

4.2.1 Device Manufacturer 28<br />

4.2.2 Encryption 29<br />

4.2.3 Operation Mode 30<br />

4.2.4 SSID 31<br />

4.2.5 Combined Day and Night data 32<br />

4.3 SUMMARY 34<br />

CHAPTER 5 RECOMMENDATIONS 36<br />

5.1 INTRODUCTION 36<br />

5.2 RECOMMENDATIONS 36<br />

5.2.1 Enable WEP or WPA 36<br />

5.2.2 Change the Default SSID 37<br />

5.2.3 Implement MAC Address Filtering 37<br />

5.2.4 Use Virtual Private Network 37<br />

5.2.5 Apply Wireless Intrusion Detection System (IDS) 38<br />

5.2.6 Utilize Network Simulation 39<br />

5.2.7 Perform Security Risk Assessment 40<br />

5.3 SUITABILITY OF APPLICATIONS TO BUSINESSES 41<br />

5.3.1 Small Businesses 41<br />

5.3.2 Enterprise 41<br />

vi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!