ISSC 343 American Military University Best Practices for Wireless Security Term Paper

Detailed description of the area researched

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Technology involved
  • Future trends
  • Global implications
  • Running head: BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
    Best Practices for Wireless Security Outline
    Robert Ramos
    ISSC343
    12/1/19
    1
    BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
    2
    Best Practices for Wireless Security Outline
    Topic:
    Best Practices for Wireless Security
    Thesis:
    Even though wireless security play a significant role in protecting premises,
    several security measures can be enacted to mitigate the problems that affect them
    so as to facilitate efficient use in the world..
    I.
    Introduction
    A. Defining Wireless Security: Wireless security refers to the measures that are
    enacted to prevent damage or unauthorized access to data or computers using
    wireless networks.
    B. Thesis Statement: Even though wireless security play a significant role in
    protecting premises, several security measures can be enacted to mitigate the
    problems that affect them.
    II.
    Body
    C. Wireless Security Features:
    1. Features that are incorporated in securing wireless networks.
    i.
    Rogue points
    ii.
    Authentication process
    iii. How encryption is carried out in wireless networks.
    2. Solution for protecting wireless security.
    i.
    Identifying the service set.
    ii.
    Securing the access points.
    3. Global trend of the wireless security
    BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
    i.
    3
    Explanation of how wireless security is trending globally.
    4. Future trend of the wireless security
    1) There are several features that are incorporated to secure wireless security. Some of these
    features include rogue points and having an authentication process. Encryption is also
    another wireless security feature.
    Transition: After looking at the essential components of the wireless security, it is essential to
    identify some of the measures that can be enacted to protect the wireless security.
    2) Several solutions can be put in place to protect the wireless security system. Among the
    effective solutions include having an authentication system and a secured access point.
    Transition: The identification of features and solutions to some of the problems affecting
    wireless security creates a better platform of investigating how the system is trending
    globally.
    3) Some of the global trends of wireless security includes Wi-Fi protected entrée.
    Transition: Due to the enhanced technology advancement, wireless security will play a
    significant role in the future.
    4) In the future, wireless security can be used in accessing security risks ad securing
    different services flaws that use wireless network.
    III.
    Conclusion
    A. Reviewing major points:
    1. Features that are incorporated in securing wireless networks.
    2. Solution for protecting wireless security.
    3. Global trend of the wireless security
    4. Future trend of the wireless security
    BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
    B. Restating Thesis: With proper solutions enacted to protect the wireless
    security, they can play a significant role in the world.
    4
    BEST PRACTICES FOR WIRELESS SECURITY OUTLINE
    5
    Bibliography
    Abel, V. S. (2017, January 4). Survey of Current and Future Trends in Security in Wireless
    Networks. Retrieved December 1, 2019, from dokumen.tips website:
    https://dokumen.tips/documents/survey-of-current-and-future-trends-in-security-inwireless-networks.html
    Boncella, R. J. (2002). Wireless Security: An Overview. Communications of the Association for
    Information Systems, 9. https://doi.org/10.17705/1cais.00915
    Feng, P. (2019). Wireless LAN security issues and solutions. Retrieved December 1, 2019, from
    2012 IEEE Symposium on Robotics and Applications (ISRA) website:
    https://www.academia.edu/26947144/Wireless_LAN_Security_Issues_and_Solutions
    Karygiannis, T., & Owens, L. (n.d.). Wireless Network Security Special Publication 800-48.
    Retrieved from
    https://pdfs.semanticscholar.org/eb29/c7b10d61c1041a3f5103623bc32aab65f172.pdf
    Riaz, F. (2019). WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN
    WIRELESS NETWORK. Retrieved December 1, 2019, from Academia.edu website:
    https://www.academia.edu/32441736/WIFI_SECURITY_A_LITERATURE_REVIEW_OF_SECURITY_IN_WIRELESS_NET
    WORK

    Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER