Detailed description of the area researched
Running head: BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
Best Practices for Wireless Security Outline
Robert Ramos
ISSC343
12/1/19
1
BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
2
Best Practices for Wireless Security Outline
Topic:
Best Practices for Wireless Security
Thesis:
Even though wireless security play a significant role in protecting premises,
several security measures can be enacted to mitigate the problems that affect them
so as to facilitate efficient use in the world..
I.
Introduction
A. Defining Wireless Security: Wireless security refers to the measures that are
enacted to prevent damage or unauthorized access to data or computers using
wireless networks.
B. Thesis Statement: Even though wireless security play a significant role in
protecting premises, several security measures can be enacted to mitigate the
problems that affect them.
II.
Body
C. Wireless Security Features:
1. Features that are incorporated in securing wireless networks.
i.
Rogue points
ii.
Authentication process
iii. How encryption is carried out in wireless networks.
2. Solution for protecting wireless security.
i.
Identifying the service set.
ii.
Securing the access points.
3. Global trend of the wireless security
BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
i.
3
Explanation of how wireless security is trending globally.
4. Future trend of the wireless security
1) There are several features that are incorporated to secure wireless security. Some of these
features include rogue points and having an authentication process. Encryption is also
another wireless security feature.
Transition: After looking at the essential components of the wireless security, it is essential to
identify some of the measures that can be enacted to protect the wireless security.
2) Several solutions can be put in place to protect the wireless security system. Among the
effective solutions include having an authentication system and a secured access point.
Transition: The identification of features and solutions to some of the problems affecting
wireless security creates a better platform of investigating how the system is trending
globally.
3) Some of the global trends of wireless security includes Wi-Fi protected entrée.
Transition: Due to the enhanced technology advancement, wireless security will play a
significant role in the future.
4) In the future, wireless security can be used in accessing security risks ad securing
different services flaws that use wireless network.
III.
Conclusion
A. Reviewing major points:
1. Features that are incorporated in securing wireless networks.
2. Solution for protecting wireless security.
3. Global trend of the wireless security
4. Future trend of the wireless security
BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
B. Restating Thesis: With proper solutions enacted to protect the wireless
security, they can play a significant role in the world.
4
BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
5
Bibliography
Abel, V. S. (2017, January 4). Survey of Current and Future Trends in Security in Wireless
Networks. Retrieved December 1, 2019, from dokumen.tips website:
https://dokumen.tips/documents/survey-of-current-and-future-trends-in-security-inwireless-networks.html
Boncella, R. J. (2002). Wireless Security: An Overview. Communications of the Association for
Information Systems, 9. https://doi.org/10.17705/1cais.00915
Feng, P. (2019). Wireless LAN security issues and solutions. Retrieved December 1, 2019, from
2012 IEEE Symposium on Robotics and Applications (ISRA) website:
https://www.academia.edu/26947144/Wireless_LAN_Security_Issues_and_Solutions
Karygiannis, T., & Owens, L. (n.d.). Wireless Network Security Special Publication 800-48.
Retrieved from
https://pdfs.semanticscholar.org/eb29/c7b10d61c1041a3f5103623bc32aab65f172.pdf
Riaz, F. (2019). WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN
WIRELESS NETWORK. Retrieved December 1, 2019, from Academia.edu website:
https://www.academia.edu/32441736/WIFI_SECURITY_A_LITERATURE_REVIEW_OF_SECURITY_IN_WIRELESS_NET
WORK