Describe the security strategies that you plan to implement for RF shielding, rogue access point detection, data encryption, and authentication.

Design a security deployment strategy that is appropriate for your specific organization. Your discussion and design should correlate with the organization description that you provided in Assessment 1.
Create a diagram that displays a site plan from a security deployment perspective; include changes relative to topology and hardware placement.
Write an analysis of your security infrastructure design, providing appropriate rationale for the chosen topology and hardware selection.
Describe the security strategies that you plan to implement for RF shielding, rogue access point detection, data encryption, and authentication.
Write an analysis of your security strategies, providing appropriate rationale for your chosen shielding, detection, data encryption, and authentication measures.
Design a security policy for deploying your wireless infrastructure, and identify the steps necessary to maintain the security and authenticity of your environment.

Latest Assignment