You are on page 1of 5

20/04284

BACHELOR OF SCIENCE IN INFORMATION SECURITY AND FORENSICS

BISF 2306 WIRELESS NETWORKS

ASSIGNMENT

20/04284 FELIX OTIENO

Read the paragraph and use it to answer the questions below. The increasing popularity of mobile
terminals equipped with wireless local area network (LAN) functions has driven the installation of
wireless LAN access points (APs) in both indoor and outdoor locations and the creation of Internet
connection environments in all sorts of places. In line with this trend,5th-generation home
gateway compliant with the new IEEE802.11ac*1 wireless networking standard and has been
expanding its communication services using wireless LAN . However, communication faults can
occur as a result of insufficient signal strength, signal interference, incompatible communication
protocols, and other factors. Finding ways of recovering from faults quickly and improving service
quality has consequently become a matter of urgency.

1. Discuss the various possible causes of Signal impairment (3 marks)

Signal impairment refers to the degradation or loss of signal quality in a communication


system. There are several possible causes of signal impairment, including:

1. Attenuation: Attenuation refers to the loss of signal strength over distance or due to
obstructions. As a signal travels through a medium such as air, water, or a cable, it
loses energy, resulting in a weaker signal. This can be a problem in wireless
communication systems where signals have to travel through physical barriers such
as walls or buildings.
2. Interference: Interference occurs when other signals disrupt the intended signal. This
can happen when multiple signals are transmitted in the same frequency band,
causing them to overlap and interfere with each other. Interference can also be

1|Page
20/04284

caused by external factors such as weather, other electronic devices, or


electromagnetic radiation.
3. Noise: Noise refers to any unwanted signal that interferes with the intended signal.
Noise can be caused by thermal noise, atmospheric noise, or man-made noise from
other electronic devices. It can be particularly problematic in analog communication
systems where it can cause distortion and make it difficult to distinguish the
intended signal from the noise.

2. Elaborate the purpose of APs in a network. (2marks)

Access Points (APs) are an essential component of wireless networks. The primary purpose
of APs is to provide wireless connectivity to devices that are within range of the network.
APs act as a bridge between wired and wireless networks, allowing wireless devices to
connect to the network and access resources such as the internet, printers, servers, and
other devices.

APs allow multiple devices to connect to the network simultaneously, providing users with
flexibility and mobility. They can also help improve network performance by optimizing the
wireless signal strength and reducing interference.

In addition to facilitating wireless connectivity, APs also help manage the network by
controlling access and providing security measures such as encryption, authentication, and
firewall protection. APs can help ensure that only authorized devices can connect to the
network and that the network remains secure.

3. Outline the IEEE802.11 standard state the different versions and their
characteristics (8 marks)

The IEEE802.11 standard, also known as Wi-Fi, specifies the protocols and technologies for
wireless local area networks (WLANs). There are several versions of this standard, each with
its own set of characteristics. Here is an outline of the IEEE802.11 standard and its different
versions:

1. IEEE802.11a: This version of the standard was released in 1999 and operates on the
5GHz frequency band. It supports data rates of up to 54Mbps and is known for its
relatively short range but high throughput. It uses Orthogonal Frequency Division
Multiplexing (OFDM) modulation and has a maximum range of about 50 meters.

2. IEEE802.11b: This version was also released in 1999 and operates on the 2.4GHz
frequency band. It supports data rates of up to 11Mbps and is known for its
relatively long range but lower throughput. It uses Direct Sequence Spread Spectrum
(DSSS) modulation and has a maximum range of about 100 meters.

2|Page
20/04284

3. IEEE802.11g: This version was released in 2003 and also operates on the 2.4GHz
frequency band. It supports data rates of up to 54Mbps and is backward compatible
with IEEE802.11b. It uses OFDM modulation and has a maximum range of about 100
meters.

4. IEEE802.11n: This version was released in 2009 and operates on both the 2.4GHz and
5GHz frequency bands. It supports data rates of up to 600Mbps and is backward
compatible with IEEE802.11a/b/g. It uses Multiple Input Multiple Output (MIMO)
technology and has a maximum range of about 70 meters.

5. IEEE802.11ac: This version was released in 2013 and operates on the 5GHz
frequency band. It supports data rates of up to 1.3Gbps and is backward compatible
with IEEE802.11n. It uses MIMO technology and has a maximum range of about 35
meters.

6. IEEE802.11ax (Wi-Fi 6): This version was released in 2019 and operates on both the
2.4GHz and 5GHz frequency bands. It supports data rates of up to 9.6Gbps and is
backward compatible with IEEE802.11a/b/g/n/ac. It uses MIMO technology and has
a maximum range of about 120 meters.

Each version of the IEEE802.11 standard has its own unique set of characteristics, including
data rate, frequency band, range, modulation, and backward compatibility. As technology
advances, newer versions of the standard are released to accommodate the growing
demand for faster and more reliable wireless communication.

4. Discuss three security issues associated with cloud computing and what cloud users should
do about them. ( 3 marks)

Data breaches: One of the biggest security concerns associated with cloud computing is the
risk of data breaches. These breaches can occur due to a variety of reasons, including weak
passwords, unpatched software vulnerabilities, and phishing attacks. To prevent data
breaches, cloud users should use strong passwords, enable two-factor authentication, keep
their software up-to-date, and regularly back up their data.

Data loss: Another security concern associated with cloud computing is the risk of data loss.
This can occur due to hardware or software failures, natural disasters, or cyber attacks. To
prevent data loss, cloud users should back up their data regularly, choose a cloud provider
that offers data redundancy, and test their backups to ensure they are working properly.

Insider threats: Insider threats refer to security breaches caused by employees or other
authorized users. This can occur due to malicious intent, human error, or compromised
credentials. To prevent insider threats, cloud users should implement access controls, such
as role-based access and least privilege, monitor their systems for unusual activity, and
conduct regular security awareness training for their employees.

3|Page
20/04284

5. Discuss the threat employees pose to information system security.

Employees pose a significant threat to information system security because they have direct
access to sensitive data and are often unaware of the risks associated with their actions.
Here are some ways in which employees can pose a threat to information system security:

1. Human error: One of the most common ways in which employees pose a threat to
information system security is through human error. This can include actions such as
using weak passwords, clicking on phishing emails, failing to update software, or
accidentally deleting important data.
2. Malicious intent: In some cases, employees may intentionally engage in activities
that threaten information system security. This can include stealing sensitive data,
introducing malware into the system, or disrupting critical operations.
3. Insider threats: Insider threats refer to security breaches caused by employees or
other authorized users. This can occur due to malicious intent, human error, or
compromised credentials. Insider threats can be particularly difficult to detect
because the individual responsible already has authorized access to the system.
4. Lack of security awareness: Another way in which employees can pose a threat to
information system security is through a lack of security awareness. Many
employees are unaware of the risks associated with their actions, such as using
personal devices on the company network or accessing sensitive data on unsecured
networks.

6. Discuss why wireless networks are more susceptible to security problems and how
businesses can protect them (4 marks)

Wireless networks are more susceptible to security problems than wired networks because
wireless signals are broadcasted over the air, making them more vulnerable to interception
and attacks by unauthorized users. Here are some of the reasons why wireless networks are
more vulnerable:

1. Lack of Physical Security: Wireless networks are easier to access physically as they
are not restricted by cables or wires. Unauthorized individuals can simply walk into
the range of a wireless network with a device that is capable of intercepting wireless
signals, and gain access to the network.
2. Encryption: Wireless networks use encryption protocols such as WEP, WPA, and
WPA2 to secure their transmissions. However, these protocols have known
vulnerabilities, and if not configured correctly, can be easily cracked by attackers.
3. Rogue Access Points: Rogue access points are unauthorized wireless access points
that are set up within a network's range. These access points can allow unauthorized
access to the network, and can be used to intercept sensitive data.

4|Page
20/04284

4. Signal Interference: Wireless signals can be easily disrupted by interference from


other wireless devices or environmental factors, such as walls, trees, and buildings.
This can result in dropped connections and data loss.

To protect their wireless networks, businesses can take the following steps:

1. Implement strong encryption protocols such as WPA2 with strong passwords and
limit access to authorized personnel.
2. Regularly monitor the network for rogue access points and take necessary actions to
remove them.
3. Implement physical security measures, such as locking down wireless access points
and limiting physical access to them.
4. Regularly update and patch network devices and software to address known
vulnerabilities.
5. Implement network segmentation to limit the potential damage that can be caused
by an attacker gaining access to the network.

5|Page

You might also like