Perform research on the Internet to understand security threats and attack vectors in a wireless network scenario. How could post-exploitation activities and evasive maneuvers be done in this type of environment? What security controls would you recommend implementing to avoid these post-exploitation activities and evasive maneuvers from being effective?
Submit your essay including the lab report for this assignment by 11:59 pm on Sunday of this week.
Additional Requirements
- Written communication: Ensure written communication is free of errors that detract from the overall message.
- Length of paper: 1-2 typed, double-spaced essay pages, lab report pages, title page, and reference page.
- Format: Format resources and citations according to APA guidelines for style and format.
- Font and font-size: Use Times New Roman 12-point font.
- Sources: Cite at least two sources.
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria.
- Competency 1: Describe the core concepts, technologies, components, and security issues related to mobile and wireless networks.
- Apply internet research findings to analyze core concepts and applied technologies regarding security threats and attack vectors in a network context.
- Competency 2: Compare and contrast different approaches to digital communication.
- Describe performing post-exploitation activities and evasive maneuvers to avoid detection in a network in a lab context.
- Recommend security controls to implement to prevent post-exploitation activities and evasive maneuvers to avoid detection in a network context.
- Competency 5: Apply network defense tools to identify and mitigate wireless security concerns.
- Complete the lab tasks as described in the lab learning objectives.
- Describe how performing post-exploitation activities and evasive maneuvers to avoid detection can be applied in a network context.
- Competency 6: Exhibit proficiency in writing, critical thinking, and research topic areas in real-life data communication networks.
- Organize content so ideas flow logically with smooth transitions.
- Convey clear meaning through appropriate word choice and usage.