A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN…
For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft. (Johansson et al., 2007)Wi-Fi networks have to be carefully encrypted to prevent unauthorized use. For example, people committing fraud or dealing in illegal materials via the Internet would find advantages in hacking a Wi-Fi network for Internet access that couldn't be traced to the hacker. Meanwhile, hackers have been known to monitor Wi-Fi networks in order to steal financial data and account information.
The answer to Wi-Fi security may lie in "centralized" switches. Originally, Wi-Fi antennas were complex systems that might include networking and security in the same box with the antenna. This means that if a hacker could penetrate one box, entry might be gained to the entire network. (Broch et al., 2007) This is extremely difficult to monitor and prevent in a corporation's building-wide system that might contain hundreds of antennas. Centralized Wi-Fi systems, being sold with great success by relatively new firms such as Aruba Networks, Inc. and competitors Trapeze Networks, Inc. and HP ProCurve (formerly Colubris Networks), use networks of simpler antennas, each containing a minimum of software and circuitry, all controlled from a sophisticated, very secure central switch. This concept greatly enhances security and eases maintenance and monitoring compared to previous generations of Wi-Fi antenna. (Larsson and Hedman, 2006)
As in virtually all wireless technologies, the popular Bluetooth also has security issues to consider. Hackers practicing "bluesnarfing" or "bluebugging" may be able to locate and gather data from Bluetooth-enabled devices. (Perrig & Tygar , 2002)However, the latest models of cell phones from makers such as Nokia have enhanced security measures in place, and software upgrades are often available for older devices in order to enhance security. Nonetheless, additional security concerns surfaced in U.S. news stories claiming that hackers with specially crafted receivers are able to eavesdrop on cell phone conversations on Bluetooth-wireless headsets, or to capture data being transmitted by a Bluetooth-enabled laptop. (Chin, et al., 2002) The Bluetooth Special Interest Group is strongly recommending 16-digit alphanumeric security codes to be set by individual users; such lengthy codes would be much harder to crack than the short codes used by many devices today. (Perrig & Tygar , 2002)
In Japan, a number of wireless companies are offering cell phone models equipped with cutting-edge biometric security devices. Fujitsu Ltd. makes a chip that is now embedded in DoCoMo phones that identifies a user's fingerprint. If the print does not match, the phone doesn't work. Other companies, including Matsushita Electric Industrial Co., NEC Corp. and Sharp Corp. use facial-recognition technology that uses a camera to measure the distance between a user's eyes, nose and mouth. ...
Cite this document
(“Wireless Security Essay Example | Topics and Well Written Essays - 3750 words”, n.d.)
Retrieved from https://studentshare.net/technology/275239-wireless-security
(Wireless Security Essay Example | Topics and Well Written Essays - 3750 Words)
“Wireless Security Essay Example | Topics and Well Written Essays - 3750 Words”, n.d. https://studentshare.net/technology/275239-wireless-security.
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication.
Categories of Attackers. There are many types of attackers, which intend to harm the networks. Some of the most famous types of attackers include hackers, crackers, script kiddies, spies, employees, and cyber terrorists. Selected Attacker. Of all these six types of attackers, the one, which I would like to break into my network, is a hacker.
However, large corporations with the infrastructure to create security are usually the only secure wireless networks available, and the cost is typically prohibitive for the smaller scale user. But does that mean that there is little or no security in place?
68). While wireless technologies bring a wealth of benefits and mobility for end users, there is always a cost for this convenience. As Leo (2008) and others bear out, these drawbacks can be devastating if the wrong people can gain access. The primary danger that outsiders pose to sensitive information is the mistaken belief that the sensitive information is secured behind the metaphorical wall of wireless security.
In uncomplicated expressions, such organisation by switching to wireless technology allows its consumers receive or transmit data from a mobile phone to the organisation's server that links to consumer's account information and vice versa via a link supplied by a telecommunications services provider.
Mobile phones too, they help you to send Multi-Media Messages to other people with cell phones or individual email addresses. You can also use General Packet Radio Service that is probably provided by your mobile phone network's operator to access to the internet.
Since all these devices work on wireless media, obvious vulnerabilities exist. The clients or users are prone to number of attacks like eavesdropping (to ascertain user activities and authentication information), spoofing, jamming, rogue access points, man in middle and denial of service (Godber, A.
It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc.
The main usage today of wireless technology is for the usage of internet so much that both
For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao, Zheng & Lu, 2015). The technologies include
2 Pages(500 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Wireless Security for FREE!