Verified Document

Wireless Clients Offsite Secure Hosting Book Report

The system employs frequency hopping and direct sequence modulation methods. In the frequency hopping technique, the signals "jump" from one frequency to the next within a given bandwidth. The "listening" to the signal is then carried out by the transmission unit and should a successful detection of idle time occur, then it appropriately transmits the given data packet through the full channel bandwidth. Direct Sequence Modulation

In this method, a wider band of frequency and Code Division Multiple Access (CDMA) technology are used. The signal emanating from the multiple units are transmitted at a given frequency range at a decreased power level. After the transmission of each signal, a specific code is utilized by the signal receiver in the signal identification. The frequency band used is the industrial, scientific and medical (ISM) band.

The Microwave and narrow WLANs

This form of WLAN implementation makes use of the narrow bandwidth microwaves in signal transmission. This frequency range requires FCC licensing.

WLAN topologies

The three main topologies of wireless LAN are; Basic Service Set (BSS), Independent Basic Service Set (IBSS), Independent Basic Service Set (IBSS) and Extended Service Set (ESS).

. Security threats and vulnerabilities affecting WLANs

WLANs suffer from a wide range of vulnerabilities and threats. These vulnerabilities and threats are cause d by attack aimed at disrupting the confidentiality, integrity and availability of the WLAN services. The attacks are either active or passive.

Active attacks

These attacks are propagated whenever there is unauthorized access of Wireless LAN infrastructure resources. The reasons for the attack could vary. The motive of the attack could be to modify data or to interrupt the services of the WLAN framework

The passive attacks

This form of attack is executed whenever there is non-granted access of the WLAN services for the purpose of analysis the traffic or to eavesdrop. The security risks that affect WLANs include the disruption of services, interference, data interception, Distributed Denial of service attacks, interference, and unauthorized network access among others.

Mitigation of the threats

Te data transmitted via the WLAN should be encrypted and access to the Wireless access points should be secured with WPA or WEP technology.

VoIP risk assessment

VoIP technology is noted to have the same security threats like any other IP-based data networks and devices. There are several security challenges that affect VoIP systems. According to Materna (2009), the contemporary VoIP systems require a security system that is unique and...

The system is real-time and offers a mission-critical service to corporations. The VoIP system is targeted with malicious voice technology-specific threats. The VoIP systems are faced with cyber attacks when it comes to the applications, devices as well as protocols.
Recommendations

In order for the WLAN and VoIP system to be safe from attacks, it is important for CyberTrans Ltd. To proactively defend itself. This is through the installation of firewalls, antivirus software's, antimalware programs and the installation of intrusion detection systems. The company must also come up with a security policy that is observed in the operation of its it infrastructure.

Conclusions

The company should in the safest and most scalable technologies that are standard to the tracking industry. The company must perform system upgrades and patches so as to eliminate chances of attacks by newly developed viruses and malware.

References

Agilent Technologies (2009). Increase Data Acquisition using Wireless LAN

http://www.rselectronics.com/SEO/Agilent/Increase_Data_Acquisition_Flexibility_Using_Wireless_LAN_5990-5072.pdf

Belkin (2002).WirelessNetwork Acess Point user manual.

http://cache-www.belkin.com/support/dl/f5d6130-english-manual.pdf

Bruce, WR (2002).Wireless LANs End to End, Ron Gilster (ed.).John Wiley & Sons.

Business Dictionary (n.d).Risk Assessment.

http://www.businessdictionary.com/definition/risk-assessment.html

Cisco (2007). How Cisco WLAN Became Primary Corporate User Network

http://www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/Cisco_IT_Case_Study_WLAN_Benefits.pdf

Hochmuth, P (2007), Microsoft teams to offer SMB VoIP

http://www.networkworld.com/news/2007/032007-microsoft-smb.html

Materna, B (2009). VoIP Security Best Practices. Presented at Miami Beach Convention Center

on 04/02/2009.

Available online at http://images.tmcnet.com/expo/east-09/presentations/u303-materna-voipshield.ppt

Nemertes (2004)."Convergence: Reality at Last"

International Business Machines (n.d). IBM System x3200 M3

http://www-03.ibm.com/systems/x/hardware/tower/x3200m3/index.html

Tecnoton (n.d). Vehicle tracking software.

http://www.jv-technoton.com/vehicle_tracking_software/

Teare, D & Paquet, C (2005). Campus Network Design Fundamentals. Cisco press

Shoretel (2005). Is Your Network Ready for IP Telephony?

http://download.goandcall.com/docs/Is%20your%20network%20ready%20for%20IP%20Telephony.pdf

Cite this Document:
Copy Bibliography Citation

Related Documents

Risk Assessment for Cybertrans Ltd.,
Words: 2782 Length: 10 Document Type: Research Paper

The diffused infrared configuration however, uses a transmitter that fills a given office space with signals. The signal receiver can then be located anywhere in the office area in order to successfully receive the IR signal. The Spread spectrum LANs This form of arrangement utilizes the multiple-cell configuration. Each of the cells are appropriately assigned a unique center frequency that lies within a specific band in order to avoid signal interference. This

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now