Implementation of Authentication Process
The project described focuses on the deployment of WLAN in the school environment as the key aspect of technology application in the education sector both in the primary and secondary schools. The potential user users of WLAN, in this case, are the school non-teaching staff, teachers, and the students.
Probable WLAN Risks
Likely WLAN attacks can be grouped into the passive and active attack. The passive attack will consist of unauthorized access to the network assets with the purpose of traffic analysis. This kind of attack is always not easy to detect because the data remains unaffected and this make the emphasis be made on prevention measures rather than the detection option. An active attack is the unauthorized access where one has the intension of making message modification in the data stream or file or just a message (Sankar, 2005).
The immediate and highly probable active threat is wireless intruders. If hacker acquires unauthorized access or entry to the WLAN network, they are likely to exploit and collect a ton of information on the WLAN users. In fact, the database information can be accessed, modified or deleted. Relevant records such as student fee payment records and performance records would be at the mercy of the hacker. The hacker can also be able to gather personal information such as credit card numbers from the network.
Security Requirements by User Class or Type
The security needs of this type of WLAN application can be of different forms. First, WLAN should be protected by use of specified password-protected Access Points fitted with firewalls. Also, a wireless intrusion protection system should be implemented. This form of security provides protection by monitoring the network through going around the clock and identifying specific attacks to the WLAN network. Other requirements include operating environment for security control and information system for the purpose of the security control (Sankar, 2005).
A simplified Data Classification Plan
Classifying institutional data can be based on the data value, the level of data sensitivity, and criticality. For school environment, the data can be classified as restricted data, private data, and public data.
Applications and Protocols that should be allowed on the WLAN
This kind of busy environment requires a protocol that allows for high-speed data communication, high bandwidth and also has a high level of security. The protocols include 802.11a, 802.11b, and 802.11g for Wi-Fi access. Web applications using HTTPS, SSH, and Secure TCP for Web and file access should be allowed.
PDAs WLAN Access
Personal digital assistance should be allowed to access the WLAN. These devices are small making them highly portable. They will be of great benefit to network administrators who can monitor the WLAN from anywhere within the school. However, only PDAs belonging to the school should be given this access.
References
Sankar, K. (2005). Cisco wireless LAN security: [expert guidance for securing your 802.11 networks]. Indianapolis, Ind: Cisco.