The first question has been answered to the highest level of satisfaction. It aptly meets the requirements of the question by giving detailed background on the need for Wireless LAN. The paragraph also gives drawbacks on WLAN and suggests a better and secure alternative VPN method to obtain increased confidentiality of user data. A Secure Wireless LAN (SWAN) can be employed as an extension to the traditional WLAN, which can detect intrusion, malicious activity, and keeps the QoS and network health intact. A detailed explanation is provided on the area of Bluetooth technology to best understand the benefits and drawbacks of the advanced wireless technology. The security issues of ‘Bluetooth’ have been covered properly where a mixed input has been received from victims of the Bluejack attack (Geier, 2004).
The second answer details the crucial information on why attaining maximum network security is the topmost priority of networking practitioners. It gives an overview on Firewalls and their importance in the field of computer network security for maintaining a secure environment. Types of firewalls are discussed along with how this security mechanism operates on a network. Details on blacklist and white-list have been highlighted, and appropriate literature is used to reveal about the significance of stateful firewall. A perimeter firewall performs the functions of stateful filtering, routing, user authentication, multiple interfaces, and Network Address Translation. Firewalls are security mechanisms through which computer network users can be assured of data integrity, confidentiality, storage, and availability, to a high standard. The last answer talks about RBAC or Role-based access control and its role in setting up multi-level security network. It puts emphasis on how RBAC enables the system to set individuals in an organization depending on what they ought to know and must have access to, for their daily functioning (Convery, 2008). It discusses the components of RBAC and how network users are given equal rights to access the network. A clearer background is needed on the RBAC model.
References:
Convery, S. (2008). The Authenticated Network Architecture. Identity Engines, Inc. Retrieved
from
Geier, J. (2004). Wireless System Architecture: How Wireless. Retrieved from