StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter - Essay Example

Cite this document
Summary
Running Head: CRITIQUE ON WIRELESS HOTSPOTS Critique / Position on the article “Wireless Hotspots: Petri Dishes of Wireless Security” by Bruce Potter Instructor Date Critique / Position on the article: “Wireless Hotspots: Petri Dishes of Wireless Security” by Bruce Potter This article by Bruce Potter takes the position that security over a typical wireless (Wi-Fi) hotspot network is not achievable at the current state of technology, at least at the small scales of individual and small business usage…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter
Read Text Preview

Extract of sample "Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter"

Download file to see previous pages

No, but ultimately it is limited to the resources and commonsense of the user involved to maintain security protocols. The author suggests that we completely abandon the use of these hotspots, such as in cafes, close our laptops or shut down or tablets and just enjoy the coffee. This writer feels that the horse is already out of the barn on that issue since wireless hotspots are one of the main attractions now drawing in people to stay for a longer period of time and eat or drink more product of that particular establishment proffering that tempting wireless connection to the internet.

Potter begins by describing a typical corporate network to let the reader know just how complex true security protocols must be in order to maintain an absolutely secure network. One of the biggest issues here is that a corporate network takes on the responsibility of that security and so is a single point of access that all other users must adhere to. In this case, as far as security goes, big Brother is a good thing to have. The opposite is usually true at a typical Wi-Fi hotspot where someone has plugged in a wireless router, and hundreds of users with various computers, etc.

have access to it from the front end by a simple password (if that). On the corporate level, while the use of 802.11x and WEP (Wired Equivalent Privacy) is in place, it is usually accompanied by bidirectional certificate-based authentication which identifies both clients to each other. The certificate is located both at the access point and on the client trying to gain access, allowing for a higher level of authentication and protection. Typical hotspots do not know and could care less who or what is accessing their network, and therein lies the greatest issue, according to Potter.

This lack of bidirectional authentication poses the very large and real risk of a hacker, acting friendly to gain access, can then use the wireless network to gain access to other clients accessing it. This certificate level access is nearly impossible to use at a hotspot since the accessing client’s would have to have the keying certificate in order to enter the wireless network. This solution is impractical for most individuals and small business. However, the author does not some exceptions.

“For Example, T-Mobile provides access for a fee to Wi-Fi users in Starbucks coffee shops throughout the U.S. T-Mobile has its own authentication and security infrastructure, as well as its own way of assembling network.” (Potter, 2006, p. 53) Unfortunately, this is an example of one large corporation assisting another large corporation, for a fee. Again, impractical on smaller levels. The fee imposed, though usually modest, is often met with opposition as well. This is only human nature, even though the fee may reduce the risk of a security intrusion.

According to the author, this leaves only one option: “Users of wireless hotspots are ultimately responsible for their own security.” (Potter, 2006, p. 54) By and large this wirter would agree that this is true. While providers of hotspots are rather limited as to what they can offer for free at their sites regarding access to the internet, the user must have not only adequate safeguards in place installed on their device to help prevent

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1419312-critique-on-wireless-hotspots-petri-dishes-of
(Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Essay)
https://studentshare.org/environmental-studies/1419312-critique-on-wireless-hotspots-petri-dishes-of.
“Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Essay”, n.d. https://studentshare.org/environmental-studies/1419312-critique-on-wireless-hotspots-petri-dishes-of.
  • Cited: 0 times

CHECK THESE SAMPLES OF Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter

Wireless management

When we talk about wireless Management, it is for sure that we are discussing proper configuration, management and performance assessment of a WLAN.... Using a wireless Access-point, networks can be configured with systems connected via cables and via wireless connections.... Using a wireless Access-point, networks can be configured with systems connected via cables and via wireless connections.... wireless provides several mobile services that are ready for deployment, including those for such Personal Information Management (PIM) tools as calendar, address book, fax, and mail....
5 Pages (1250 words) Essay

Wireless Network Security

The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET.... However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security.... Moreover, other type of threats that may affect the domestic wireless network operating on an 802.... nbsp;Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router....
7 Pages (1750 words) Essay

Wi-Fi Technology: Wireless Fidelity

This easiness also allowed the hackers and malicious users to compromise the security of wireless networks.... Wireless Networks use certain security measure to encrypt their communications data.... An essay "Wi-Fi Technology: wireless Fidelity" outlines that it was originally designed to allow network elements to roam in warehouses and manufacturing facilities without getting out of reach of the connected network and without being subjected to cumbersomeness of wired network elements....
10 Pages (2500 words) Essay

Wireless Network Design

Why should one use wireless instead of the traditional wired networks, the advantages, and disadvantages of wireless networks, and the components of the wireless net?... While interface which results in packet errors and security concerns are some of the shortcomings of wireless networks.... The safety and security concerns of the data on the internet must be well addressed.... This papper ''wireless Network Design'' tells that The wireless network is where users access the internet without using cables....
4 Pages (1000 words) Essay

Wireless hacking leads to corporation security breaching

Wireless hacking leads to corporation security breaching Wireless Hacking Leads To Corporation security Breaching In the world where everything is digitalized and the world is transformed into a global village, the track of big corporations and their transactions is kept by small computerized numerical pin codes that protect both the administrator and the customer.... security breaches are a very important issue in the information technology world today since, everyone relies on the computers to safeguard their assets....
2 Pages (500 words) Essay

Voice over Wireless Fidelity

The paper starts with a brief introduction of wireless fidelity and then discusses issues in wireless fidelity and disadvantages.... The equipment of wireless networks comes with a default setting configured by the manufacturer.... In the organization's individuals setting up the network sometimes fail to understand the security requirements.... However, there is substantial variation in the security measures built into these networks....
8 Pages (2000 words) Term Paper

Airport Terminal Hotspot Wireless Network

When designing a wireless point to point connectivity, the distance is always considered due to limitation of wireless technology.... hellip; This security feature is integrated within the 'Cisco Unified Wireless Network Architecture'.... 'WIPS' provides specific threat detection methodology and improved protection against malicious code, unauthorized access, security vulnerabilities, and other sources that may disrupt the network performance....
15 Pages (3750 words) Assignment

Wireless Technology Security and Its Types

This essay "Wireless Technology Security and Its Types" discusses three main types of wireless networks and types and security protocols namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN).... nbsp;… Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us