Describe mobile vulnerabilities that present risks for allia

Assignment Help Computer Engineering
Reference no: EM133621355

Assignment: Cybersecurity

Introduction

As wireless and mobile technologies continue to grow in presence and popularity, the world is becoming more and more connected. Unfortunately, this also means that devices and networks are becoming more and more vulnerable to outside threats. Businesses must identify and mitigate these vulnerabilities and threats in order to protect employees' personal information and ensure the organization is secure from passive leaking of proprietary information.

In this task you will assume the role of an IT professional who is responsible for identifying wireless and mobile vulnerabilities, as outlined in the scenario below. You will then present your findings and recommend solutions to mitigate these risks and prevent future threats.

Scenario

You are a network professional on the IT team at Alliah Company, a new but fast-growing social media provider. One year ago, Alliah launched a social media website aimed at young professionals. The company also released a mobile app for accessing the site from cellular devices. Alliah was able to launch its website with money generated by a crowd-funded campaign, but most of the funds were spent on the site and app development, with relatively little money (and time) devoted to the internal office network infrastructure.

Alliah has 35 full-time employees, all of whom have offices or shared work spaces in a three-story building that serves as the company headquarters. The building is an old warehouse that was converted for office use and is approximately 10,000 square feet. Currently, the employees occupy only two floors; the third floor is vacant and available for expansion.

The Alliah WLAN has a gigabit managed switch, a multiservice wireless LAN controller, and seven wireless access points strategically located to provide coverage to office staff. One access point services a large back patio area for employee use. The network is protected by a firewall. The Alliah website servers are located in a data center 100 miles from Alliah headquarters.

Five employees are account representatives who are on the road at least 80 percent of the time, and each rep has a company-issued laptop, tablet, and smartphone. They use a large, shared office in the headquarters building when they are not traveling.

Employees use company-owned computers that connect to the WLAN, and, in an effort to control costs during the launch, Alliah has a bring your own device (BYOD) policy.

The IT staff consists of five employees; three are devoted to website maintenance, one manages the headquarters' computers and network, and another employee assists with the website and the office network. IT staff uses wired Ethernet connections to remotely access the website servers.

The Alliah website is successful, attracting more and more visitors each month. Jennifer, the CEO, anticipates hiring more employees and is considering a strategy that would take the company public within a few years. In preparation, she wants to ensure that Alliah's wireless networking infrastructure is highly secure, especially because it may need to grow quickly in a short period of time, and she wants to understand the security risks the company faces. She also wants to decide if Alliah should continue allowing BYOD or restrict network access to company-owned devices only, or if a compromise solution is available.

Task

Question 1. Describe two WLAN vulnerabilities that present risks for Alliah, based on the details in the scenario.

Question 2. Describe two mobile vulnerabilities that present risks for Alliah, based on the details in the scenario.

Question 3. Summarize the steps for mitigating each identified WLAN and mobile vulnerability, including the specific tools or documentation that will be needed for mitigation.

Question 4. Recommend preventive measures to maintain the security posture of WLAN and mobile environments in a small business, such as Alliah. Reference federal, state, or industry regulations that justify these measures.

Question 5. Recommend a solution for the company's BYOD approach, including research to justify your recommendation.

Question 6. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

Question 7. Demonstrate professional communication in the content and presentation of your submission.

Reference no: EM133621355

Questions Cloud

Discuss heros appeal as either the classic heroic archetype : Discuss this hero's appeal as EITHER the classic heroic archetype, a philosopher-king, or a "super"hero.
Explain the argument about the morality of prostitution : Explain the argument about the morality of prostitution as it occurs in our textbook, including the question of whether prostitution should be illegal.
Drawing on extensive resources presented : Drawing on the extensive resources presented in the course readings and in the resource section for this assignment,
Division of workers compensation claims : handled either judicially by the Judge of Compensation Claims or administratively by the Division of Workers Compensation Claims.
Describe mobile vulnerabilities that present risks for allia : Describe two mobile vulnerabilities that present risks for Alliah, based on the details in the scenario.
Regular evaluations of employees skills-abilities : Regular evaluations of employees' skills, abilities, and performance help identify areas for improvement.
Do you think is simply a cyber extension of human nature : Do you think that this is simply a cyber extension of human nature: that some crime categories most people simply don't care about?
What is good scholarly introduction for presentation : What is a good scholarly introduction for a presentation in powerpoint for a SOC on Lopes Manufacturing that design, manufacture, assemble,
Define knowledge management : Define knowledge management and explain its value to businesses.Define knowledge work systems and describe the generic requirements of these systems.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd