ForumsDiscussion board forums for Mission Plan 5

This document contains a list of discussion board forums for the mission plan listed in the title above. Each discussion board forum listed in this document has a matching entry in your Blackboard Discussion Board folder as a forum. Since all that is contained in the Blackboard Discussion Board forum entry is a link to this document, you must follow the instructions detailed here for each discussion board forum assignment.

When you are ready to contribute to the Discussion Board forum, be sure that you make your entry within a new Thread and for the correct forum. To get information on how to use the Blackboard Discussion board, click on the following link: http://screencast.com/t/PQU6znZhIpp

 

All discussion board assignments are required and are worth 3 points. For information pertaining to the grading detail, please view the rubrics for each discussion board entry within Blackboard.

To access a discussion board topic, click on the appropriate topic link below:

Topic 5-1: Discuss common, modern day attacks on wireless networks.

Topic 5-2: Discuss security related topics pertaining to Bluetooth technologies.

Topic 5-3: Discuss wireless best practices.


Topic 5-1: Discuss common, modern day attacks on wireless networks.

Once an attacker discovers a wireless network and connects to it, an attack can happen. Here are a few attacks that can be made against a wireless network (click here to get an overview of these attacks):

  1. Eavesdropping

  2. Stealing data

  3. Injecting malware

  4. Storing illegal content

  5. Launching denial of service attacks

  6. Impersonating a legitimate network

  7. Stealing DNS traffic

In this discussion I would like each of you to uniquely define the following:

  1. Based on one of the attacks listed above or another known type of Wireless attack, precisely define the attack and/or state an actual occurrence of such an attack.

 


Topic 5-2: Discuss security related topics pertaining to Bluetooth technologies.

A common wireless technology used everywhere these days is Bluetooth.  Despite the fact that with Bluetooth technology you can connect to a wide range of devices, it is often overlooked with regards to security.   This discussion will give Bluetooth some focus with regards to security, such as with bluejacking and bluesnarfing attacks.   The list below itemizes a few Bluetooth technologies:

  • Hands-free car system control.
  • Home entertainment.
  • Photography.
  • Computer accessories.
  • Gaming.
  • Medical and health.
  • Smart phone integration.

In this discussion I would like each of you to define the following:

  1. A precise example of Bluetooth; giving the specifics of the devices involved and the reason for Bluetooth.
  2. Specifically focusing on Bluetooth technology, identify an actual attack or known vulnerability.

Topic 5-3: Discuss wireless best practices.

A few common practices were were already mentioned, but there are more.  

In this discussion board project you will further define one of the best practices listed below; provide a short summary of what your topic means and what makes it a concern with regards to information security. 

  1. Disabling Bluetooth.
  2. Watching for the evil twin (adhoc access point)
  3. Limit the type of work that you do.
  4. Use sites with digital certificates.
  5. Protect against physical theft.
  6. Encrypt data.
  7. Configuring devices for security.
  8. Be cautious of apps.