You can simply use Laptop, PDA or Cell Phones to establish connection to each other via Bluetooth. These devices all give you the ability to "enter a network mobile which has many benefits for you. However, wireless networking has many security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks."1
"An increasing number of government agencies, businesses, and home users are using, or considering using, wireless technologies in their environments. Agencies should be aware of the security risks associated with wireless technologies. Agencies need to develop strategies that will mitigate risks as they integrate wireless technologies into their computing environments. This document discourses some common wireless technologies in brief, outlines the risks in relation to them and will offer some guidance for mitigating those risks. "2 It also provides "top 10 tips for wireless home network security"3. We will also point to some of the ways crackers use to enter wireless networks and how they can easily bring down even a whole none wireless network via that.
No physical connection is established between the devices in a wireless network. No cable or wire to joint two devices to each other or one device to a network. All devices connect through radio frequencies to transmit the data. Wireless technology may involve complicated systems such as Wireless Local Area Networks known as WLAN. It may also include simple devices that do not have a storage system such as wireless headphones and microphones. Devices with Infra-Red technology are also involved such as a wireless mouse or a remote controller.
Wireless Networks help implementing a mechanism to transmit data between devices and also inside the devices. These networks are categorized into three main groups. Wireless Wide Area Networks or WWAN for example GSM (Global System for Mobile Communications), Wireless Local Area Networks or WLAN and Wireless Private Area Networks known as WPAN technology for example Bluetooth.
Figure 2: A Wireless Wide Area Network (WWAN)
Mainly, the devices that use wireless technology are the devices that can be carried easily from one place to another such as Laptop computers, Personal Digital Assistants (PDA's) and Cell Phones. "Many laptop computers have wireless cards pre-installed for the buyer." 4
"PDAs are data organizers that are small enough to fit into a shirt pocket or a purse. PDAs offer applications such as office productivity, database applications, address books, schedulers, and to-do lists, and they allow users to synchronize data between two PDAs and between a PDA and a personal computer. Newer versions allow users to download their e-mail and to connect to the Internet."5
Figure 3: A Wireless LAN
There are two standards for wireless technology, IEEE 802.11 developed by IEEE in 1997. It is a standard for data transmission in WLANs. "802.11 is the original WLAN standard, designed for 1 Mbps to 2 Mbps wireless transmissions. The 802.11b standard is currently the dominant standard for WLANs, providing sufficient speeds for most of today's applications. Because the 802.11b standard has been so widely adopted, the security weaknesses in the
Wireless Networks are widely used both for individual or business purposes. Today the number of Laptops, PDA's and Mobile Phones that use Wireless Communication Technologies is increasing in every minute. PDA's give you the opportunity to access to the internet, check your email and much more…
Categories of Attackers. There are many types of attackers, which intend to harm the networks. Some of the most famous types of attackers include hackers, crackers, script kiddies, spies, employees, and cyber terrorists. Selected Attacker. Of all these six types of attackers, the one, which I would like to break into my network, is a hacker.
Basic building blocks of WLAN networks are;
Access point: It is basically a transmitter having an antenna on one side and connecting wires on the other side attached to the Ethernet, DSL cable, modem etc. Linksys WAP 11, Apple AirPort, Cisco Aironet 350 Series etc.
In uncomplicated expressions, such organisation by switching to wireless technology allows its consumers receive or transmit data from a mobile phone to the organisation's server that links to consumer's account information and vice versa via a link supplied by a telecommunications services provider.
The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides.
There are various methods and approaches that can be used to solve this problem. Technology forms one of the backbones. The effectiveness of this approach and others will be examined in detail in the essay below.1
Information security may be defined as a process of protecting ones data.
Since all these devices work on wireless media, obvious vulnerabilities exist. The clients or users are prone to number of attacks like eavesdropping (to ascertain user activities and authentication information), spoofing, jamming, rogue access points, man in middle and denial of service (Godber, A.
For instance, wireless local area network (WLAN) devices, allow users to take the laptops from one department to other within the locality without losing network connectivity. But risks are natural in any wireless
The author provides some methods of protection. In passive methods radio frequency monitoring is used. The active systems can transmit signals to inquire the status of the network and also put in malicious data into the network to create interruptions. This is the most common methods and is on the rise since new abuse and tools emerge often.
It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc.
The main usage today of wireless technology is for the usage of internet so much that both
For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao, Zheng & Lu, 2015). The technologies include
2 pages (500 words)Essay
Get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Apply my DISCOUNT
Got a tricky question? Receive an answer from students like you!Try us!
Didn't find an essay?
Contact us via Live Chat, call us at +16312120006or send an email to email@example.com