18.4k views
3 votes
An administrator has noticed mobile devices from an adjacent company on the corporate wireless network. Malicious activity is being reported from those devices. To add another layer of security in an enterprise environment, an administrator wants to add contextual authentication to allow users to access enterprise resources only while present in corporate buildings.

Which of the following technologies would accomplish this?

A. Port security
B. Rogue device detection
C. Bluetooth
D. GPS

User CowZow
by
7.7k points

1 Answer

1 vote

Final answer:

GPS technology would accomplish the task of providing contextual authentication for users by verifying their location within corporate buildings, thus enhancing security. It must be implemented with consideration for privacy regulations.

Step-by-step explanation:

To add another layer of security to ensure that users can access enterprise resources only while being present in corporate buildings, the administrator should consider using GPS technology. GPS can provide location-based authentication, which would help in verifying that users are indeed within the corporate premises before allowing them to connect to the network. This method addresses the concern of preventing devices from an adjacent company or any unauthorized device outside the designated area from connecting to the corporate wireless network.

It is important to balance the need for security with the concern for privacy. While technology like GPS can enhance security and operational efficiency, ensuring proper data handling and setting limits on surveillance is critical to prevent misuse. Considering the sensitivity of GPS data, companies should implement this technology ethically and in compliance with privacy laws and regulations.

User Brandon Wagner
by
8.0k points