0% found this document useful (0 votes)
32 views2 pages

NSA Lab4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

NSA Lab4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Name: Prathamesh Tidke

Roll No.: C52


Batch: C3 [Cyber Security]

As a chief security officer for ABC Inc., you are responsible for keeping ABC Inc.'s Wi-Fi Network Secure.
Make a list of 5 Best Practices for Improving the Wi-Fi Network Security of ABC Inc.

1. Strong Encryption:
Use WPA3 or a similarly robust encryption protocol for your Wi-Fi network. Encryption is like a secret code
that protects data as it travels between devices and the Wi-Fi access point. WPA3 is the latest Wi-Fi security
standard and provides advanced encryption techniques to safeguard data. It's essential to use encryption
because it prevents eavesdropping, making it extremely difficult for attackers to intercept and decipher
sensitive information.

2. Unique and Complex Passwords:


Strong and unique passwords are a fundamental component of network security. Encourage employees to
create passwords that are not easily guessable. Passphrases, which are longer combinations of words and
characters, are more secure. For example, "P@ssw0rdS3cur1ty!" is a strong passphrase. Regularly changing
passwords adds an extra layer of security. Enforce password complexity requirements, such as including a
mix of upper and lower-case letters, numbers, and special characters, to make passwords harder to crack.

3. Network Segmentation:
Network segmentation involves dividing the network into smaller segments or VLANs. This practice
separates your Wi-Fi network from the internal corporate network. By doing this, you limit the potential
lateral movement of attackers. If an unauthorized user gains access to the Wi-Fi network, they will still have
a tough time accessing sensitive internal resources, as these are on a different network segment. Access
control and firewall rules can be used to enforce these boundaries.

4. Regular Firmware Updates:


The firmware of Wi-Fi routers and access points is essentially their operating system. Manufacturers release
updates to address security vulnerabilities and improve device performance. Regularly check for firmware
updates and apply them as soon as they are available. Outdated firmware can become a weak link in your
network security, as attackers may exploit known vulnerabilities. Timely updates ensure that your Wi-Fi
equipment is as secure as possible.
5. Intrusion Detection and Monitoring:
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are tools that actively monitor
your network for unusual or suspicious activities. IDS passively monitor and alert you to anomalies, while
IPS can actively block potential threats. Network monitoring tools track network traffic, patterns, and
behaviors. They help identify signs of a security breach or intrusion. Continuous monitoring is critical, as it
enables early detection and rapid response to security incidents, reducing the impact of potential breaches.

You might also like