59.5k views
5 votes
In the Learning Activity titled “Wireless LANs” in Topic 4, Figure 1.10, Basic Service Set (BSS) topology is very much like a Star topology. If you are the Network Administrator for a small company, what are some steps that you would take to decide what type of wireless network security you would use? Discuss the considerations that you would take and the type of information you would need to gather prior to making your decision. Select one of the wireless network security protocols discussed in the Learning Activity and provide justification to support your recommendations and discuss your rationale in selecting a security model

1 Answer

2 votes

Answer:

As a Network Administrator for a small company, I would take the following steps to decide the type of wireless network security to use:

Determine the size of the network: The size of the network will impact the type of security that can be used. For a small network with a limited number of users and devices, a simple security protocol such as WEP may be sufficient. However, for larger networks, a more complex and secure protocol such as WPA2 may be necessary.

Assess the level of risk: The level of risk is an important consideration when choosing a security protocol. If the network contains sensitive information, such as personal or financial data, then a higher level of security is required to protect this information.

Gather information about the devices and software used: The devices and software used by the network will determine the type of security protocol that can be used. Some older devices may not be compatible with newer security protocols, so it is important to gather information about the devices and software used in the network.

Based on the above considerations, I would recommend using the WPA2 security protocol. WPA2 is a widely used and well-established security protocol that provides strong encryption and is compatible with most modern devices. The use of WPA2 will provide a high level of security for the network and help to protect sensitive information.

In conclusion, the selection of a wireless network security protocol is an important decision that should be made based on a thorough analysis of the network requirements, size, and level of risk. The use of WPA2 is recommended for its strong encryption, compatibility with modern devices, and widely accepted standards.

User SaguiItay
by
7.3k points