SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhen an Army tactical commander begins a campaign, one of the first orders he issues is 'Scouts Out.!' This order is given to provide security to the front and flanks of his force by sending security elements (Cavalry Scouts) to guard his flanks and provide early warning to the commander. The U.S. Army recently announced the adoption of two wireless network systems for soldiers called 'Land Warrior' and CAISI that provide wireless communication between the individual soldier and his leaders as well as support teams and their supply depots. The Army has chosen AES because it is a more robust wireless security protocol than is the commonly used WEP. This use of advanced technology on the battlefield is certain to have a positive impact on the use of wireless in the business community both in the implementation of wireless technology and in the use of advanced methods to secure the network traffic. This paper will discuss the following: the Army's implementation of 802.11 wireless networks and the methods used to secure those networks the issues with WEP DES and AES current issues in corporate wireless security and a look at Defense in Depth as the best practice to secure the wireless network.