Wednesday, June 12, 2019

Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 words

Security Risk Mitigation Policies - Coursework ExampleThe first option should involve different methods for making it more intricate to intercept and locate the radiocommunication signals. This way, hackers provide have a hard time locating the organizations signal. Additionally, the other principal option will involve utilization of encryption in order to preserve confidentiality even when the wireless signal gets intercepted (Choi et al., 2008).It will also be imperative for the organization to utilize signal-hiding techniques so as to the right way intercept wireless transmissions. This is because for any attacker to successfully intrude into a wireless network, they will first need to locate and identify the wireless network. This will be achieved by utilizing numerous steps that will make it extremely difficult to locate the organizations wireless access point. Therefore, the company should include some of the easiest as well as least costly methods which include turning off the service set identifier (SSID) which broadcasts by wireless access points. This will not totally make it hard for hackers to have no access, but also, it will make it hard for them to access the companys servers and download sensitive and personal materials. Moreover, grant cryptic names to the SSIDs will also make it hard to access the organizations data. Additionally, reducing the organizations signal will provide requisite coverage.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.