Networking security risks

To ensure the promise of connection is achieved


Together with the benefits and freedoms that come with the use of microcontrollers, networking introduces substantial security issues. To ensure that the promise of connection is achieved, IT administrators must examine all relevant factors while planning and developing wired and wireless networks. User authentication, secret information protection, intellectual property preservation, configuration, and reliability must all be properly enforced and monitored (Karmakar). Systems are utilized at the microcontroller level to ensure that consumers obtain power efficiency and intelligent components with a choice of connecting possibilities. Wireless and wired connectivity are among the available possibilities.<\/p>


Wireless networks and Bluetooth connections


Wireless connections and networks are typical ways in today's environment. This relationship poses a significant security risk. Wireless networks and Bluetooth connections are insecure simply due to the possible accessibility to anyone in the surrounding areas. As such, any wireless connection has to be considered vulnerable. Keeping in mind the fact that Wi-Fi and Bluetooth can be accessed via smartphones, tablets, and computers, the wireless access points are required to ensure data encryption between the wireless stations and the access points. Standard industry technology like IPsec can be effectively applied to secure traffic. Its wired equivalent privacy (WEP), as well as the WPA-PSK (Wi-Fi Protected Access Preshared Key), are not the recommended security access options. This is because the two can be derived from the existing data volumes hence not considered foolproof. Security access for wireless networks must offer unique dynamic keys. For this reason, most IT experts recommend the application of 802.1x Extensible Authentication protocol coupled with transport layer security or protected EAP (Aruba 1). These combinations offer the option of user-specific credentials, user-specific certificates as well as password identification.<\/p>


Data replay and identity tricks


Attackers can obtain data in a malicious way through data replay and identity tricks. The security protocols mentioned earlier which include IPsec, EAP-TLS, and temporal key integrity protocols make the replay of data useless. Concerning character tricks, the mutual identification and validation play important roles in mitigating such attacks. The use of wireless switches also known as access concentrators is recommended as one of the top solutions.<\/p>


Concerning wired connections


Concerning wired connections, it is also easy to connect to and access resources. An example is the ability to access wired networks via the internet protocol built-in switch port found on the phone. Although there is a need for authentication, not all the devices connected through the IP phone require the same. As such, the first option is to use the non-AAA enforcement. The primary objective here is to minimize the efforts needed to install a policy enforcement service. This method requires a minimal configuration where any device plugged into the wired port leads to a notification. The information displayed can then be used to validate the connected device. The other option is to apply the identity \u2013based 802.1x authentication which is considered the most secure method. The system utilizes real-time certification, passwords, and login details. The secure access facilitates information sharing with the accompaniment of firewalls and several other security components that ensure threat prevention. Additionally, the 802.1x supports the use of logins and passwords that are considered higher-level security protocols (Aruba 2).<\/p>


Conclusion


Security for wireless and wired connections at the microcontroller level is paramount. Currently, there are available onboard services that allow for automation and configuration when it comes to the authorization and enforcement aspects. This capability is used on wireless, wired and VPN networks to ensure security and a continuously safe user experience.<\/p>


Works Cited


Aruba. Access Control Options for Wired Networks. Sunnycale: Aruba, 2016.


Karmakar, Ronak DesaiArijit. "Designing power-efficient and secure home automation systems." 20 March 2017. Embedded. Accessed 24 April 2017.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price