C844 and Mobile Security
in Other (Other) by vommsYour Price: $6.00 (30% discount)
You Save: $2.57
Description
WLAN and Mobile Security Plan
Table of Contents Introduction 1 A. WLAN Vulnerabilities 1 B. Mobile Vulnerabilities 2 C. Steps to Mitigate Vulnerabilities 2 D. Preventative Measures 3 E. BYOD Approach 3
Introduction In this paper, I will discuss the Alliah Company case study. Alliahs CEO wants to make sure everything is secure as she gets ready to take her company public in the next year or so. We will discuss WLAN vulnerabilities, mobile vulnerabilities, steps to mitigate vulnerabilities, preventative measures, and how they could better address BYOD.
A. WLAN Vulnerabilities The first vulnerability that Alliah needs to be aware of is rouge access points. The case study states that the third floor is empty, so a rouge access point could be added up there. One could even...