StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Hacking Threats and Vulnerablilities of Wireless Networks in Organizations - Term Paper Example

Cite this document
Summary
The Hacking Threats and Vulnerabilities of Wireless Networks in Organizations Name CMIT 265 Hacking Threats and Vulnerabilities of Wireless Networks in Organizations Wireless networks are gaining popularity due to their cost efficiency, convenience and how fast and easy they integrate with other networks as compared to wired networks (Goldsmith, 2005)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
The Hacking Threats and Vulnerablilities of Wireless Networks in Organizations
Read Text Preview

Extract of sample "The Hacking Threats and Vulnerablilities of Wireless Networks in Organizations"

Download file to see previous pages

This increases their chances of interception, disruption and alteration as compared to wired networks. Confidentiality can be highly compromised if the message is not encrypted. This can allow an unauthorized person to read the message. Sources of Threats and Vulnerabilities in Wireless Networks In wireless networks four basic technology components face security threats. These are; the transmission medium, access points, client devices (for example computers, PDAs) and the clients. Each one of them can become a loophole for any or all the other components to be attacked.

Unauthorized access to an organizations wireless network can result from an accidental association. This is where someone outside the organization turns their computer on and it connects to the organization’s network from a wireless Access Point (AP) (Anthes and Hoffman, 2003). Though it is not intentional, it compromises on the confidentiality of the organization’s information. It could lead to a link from one organization to another. Hacking can also be done by people forming a malicious association.

They make their own wireless devices to connect to the organization’s network. They use a cracking laptop, called “soft AP”, to access the organization’s information instead using the of organization’s AP. . According to Anthes and Hoffman (2003), hackers can be able to listen to an organization’s communications and identify the MAC address of the organization’s computer. This is called Identity theft /MAC spoofing. Hackers use programs that tend to ‘sniff’ networks hence gain unauthorized access to an organization’s network.

They also use some software that makes a computer to pretend to have all MAC addresses required by the hacker. A computer can be enticed to log into another computer that has been set up as a soft AP by hackers. This allows a cracker to link to an organization’s legal AP using a wireless card that offers a continuous traffic flow through the hacking computer (Anthes and Hoffman, 2003). hackers can also utilize existing security faults and abuse of protocols example Extensible Authentication Protocol (EAP) to carry out a “de-authentication attack”.

This is where the organization’s computers connected to the organization’s AP drop their connections and connect to the soft AP of the cracker. Software such as LANjack and AirJack enhance hacking because they automate multiple steps of the connection process (Clay, 2006). Hackers can launch attacks meant to deny the organization services through the organization’s network. This is called Denial of service (DoS). A cracker will bombard an organization’s AP or network with, premature successful connection messages, bogus requests and other commands.

As a result of this, the organization may no longer access their network. The network can also crash as a result of this (Clay, 2006).Hackers can also inject false network re-configuration commands. This will tamper with the intelligent hubs, routers and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Hacking Threats and Vulnerablilities of Wireless Networks in Term Paper”, n.d.)
Retrieved de https://studentshare.org/environmental-studies/1405470-the-hacking-threats-and-vulnerablilities-of
(The Hacking Threats and Vulnerablilities of Wireless Networks in Term Paper)
https://studentshare.org/environmental-studies/1405470-the-hacking-threats-and-vulnerablilities-of.
“The Hacking Threats and Vulnerablilities of Wireless Networks in Term Paper”, n.d. https://studentshare.org/environmental-studies/1405470-the-hacking-threats-and-vulnerablilities-of.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Hacking Threats and Vulnerablilities of Wireless Networks in Organizations

An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels

At the present, the trend of wireless networks has become very common.... At the present, the trend of wireless networks has become very common.... In the past few years, wireless networks have caught the attention of the majority of business organizations as well as individuals.... hellip; In the past few years, wireless networks have caught the attention of the majority of business organizations as well as individuals.... This paper presents a detailed analysis of some of the important aspects associated with wireless networks....
30 Pages (7500 words) Research Paper

Increasing Vulnerability of Organizational Information Assets

 Wireless Security Challenges wireless networks based on radio technology are also vulnerable to security penetration for the reason that radio frequency bands are easy to scan and detect for the attackers.... Information systems are vulnerable and in danger due to a number of possible threats and hazards.... However, there are two major types of threats known as deliberate threats and unintentional threats.... However, in the hacking community, the term cracker is normally employed to demonstrate a hacker with criminal objectives, though in the public press, the terms cracker and hacker are employed interchangeably....
7 Pages (1750 words) Assignment

Wireless Communications - Benefits and Risks

large number of business & educational journals & white papers have emphasized the security issues of wireless communications and need for stringent controls given that enhanced accessibility features of such technologies have also given birth to substantial access control vulnerabilities thus giving chance to unauthorized intruders to access the business resources of organizations.... wireless technologies allow end users to remain connected to their business services much more than wired technologies especially when the users are mobile....
13 Pages (3250 words) Essay

Vulnerability Assessment on your System at Home

They are searching for any loop holes to govern the networks and computing devices along with highly classified.... Virtual private networks transmit data after encryptions in a secure tunnel.... If we take an example of an enterprise network, these networks are comprised of components such as Servers, Firewalls, File servers, Intrusion detection software and hardware, routers, switches etc.... As we know that security threats are always a debatable topic because they keep on disrupting networks, it will be intimidating to handle the network vigilance along with updates and maintenance of the huge enterprise network....
14 Pages (3500 words) Essay

Rogue Access Point Network Security Paper

This paper ''Rogue Access Point Network Security Paper'' tells what the main concern was the understanding of ways by which organizations network securities can be exposed to any form of network dangers, and the assessment of the security requirements and approach needed to fully comprehend.... In this study, the main concern was the understanding of ways by which organizations network securities can be exposed to any form of network dangers, and the assessment of the security requirements and approach needed to fully comprehend and address the weaknesses of the network system's access points....
6 Pages (1500 words) Term Paper

Hacking and Hackers

hellip; Spotting hackers is a primary dread to the users of wireless networks right from individual users, to huge organizations and sometimes even the government.... In recent times the uses of wireless networks had undergone phenomenal growth and so are the attempts of hacking and network intrusions.... iterature reviewThe use of wireless networks and the internet has become inseparable in our day to day life.... wireless networks have become an essential part of our daily life....
8 Pages (2000 words) Literature review

Network Security and Control Mechanisms - Threats and Challenges

It is then exchanged over wireless networks for ease of use within an organization.... This paper ''Network Security and Control Mechanisms - threats and Challenges'' presents a framework that is designed to help managers to understand and to be able to assess the various threats associated with wireless technology use.... hellip; Although implementation of technological solutions is usually the most applied response to wireless security threats and vulnerabilities, wireless security is most basically a management issue....
15 Pages (3750 words) Research Paper

Current Trends in Information Security

The paper "Current Trends in Information Security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... Current threats to information security The two major threats to information security include; phishing and hackingPhishingPhishing, also known as “carding” or “brand spoofing,” refers to a form of social engineering where an attacker, known as a phisher, deceptively retrieves data of a legitimate user's confidential information by copying electronic communications from an organization in an automated manner (Shi and Saleem 2012)....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us