Wireless Security - Research Paper Example

Comments (1) Cite this document
Wireless networking offers wonderful advantages and opportunities to get easy access to communication and collaborative services. Due to this reason, it has been evolving quickly around the world. In addition, most of the modern technologies today are completely reliant on wireless communication. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Wireless Security
Read TextPreview

Extract of sample "Wireless Security"

Download file to see previous pages On the other hand, there are countless security and privacy issues also emerging in wireless networking environments. Though, the new technologies require more and more high level application of wireless communication networks, but such implementations are being established without giving significant concentration to privacy and security related issues. Consequently, the majority of wireless networks around the world are in danger regarding security and safety. Thus, there are a lot of chances that someone with appropriate equipment could be able to spy network traffic. In this scenario, they can get access to users’ passwords and other data (Gerkis, 2006; The State University of New Jersey, 2006).
In addition, these security issues and attacks are not immediately theoretical. Additionally, techniques and tools to tap near wireless networks are extensively accessible, even for palmtop devices (Gerkis, 2006; The State University of New Jersey, 2006). In this situation there is vital need for implementing wireless security. Wireless security management has turned out to be a hot issue in literature. This paper presents a detailed analysis of wireless security related issues and their management. This research will analyze some of the important aspects of wireless security, main challenges and possible mitigation techniques.
TECHNOLOGY INVOLVED IN WIRELESS NETWORKS Consider the fact that users of WLAN (wireless local area network) are able to travel along with their laptop computers and other devices from one location to another inside their offices or houses without breaking the link with the network. Thus, many corporations and general public at the present think that wireless communication based devices are very useful, efficient, and easy to operate. On the other hand, personal networks based on wireless technology help users receive and distribute data, as well as software applications, by making use of network systems and other users of the network with well-matched devices, without establishing a connection to printer cables and other secondary device links. In fact, with wireless networking users of small PDA, hand-held devices and cell phones can effectively coordinate data and information among PDAs and personal computers, as well as are able to effectively make use of internet based services like that web browsing, email and internet access. In addition, wireless communications can help individuals and business firms reduce their networking or wiring costs (Radack, 2011; Gerkis, 2006; css-security, 2010). In this scenario, Information Technology Laboratory established by NIST (National Institute of Standards and Technology), presents various standards and measures which can be adopted to enhance safety and security of wireless communication networks. Additionally, National Institute of Standards and Technology Special Publication (SP) 800-48, Wireless Network Security, 802.11, Bluetooth, and Hand-held Devices, whose authors were Les Owens and Tom Karygiannis, outlines 3 main and fundamental aspects of wireless security: (Radack, 2011; Ge ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Wireless Security Research Paper Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1394215-wireless-security
(Wireless Security Research Paper Example | Topics and Well Written Essays - 3000 Words)
“Wireless Security Research Paper Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/information-technology/1394215-wireless-security.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
shemarsmith added comment 5 months ago
Student rated this paper as
I had an issue with a research paper types of works. All until I came across this website and this particular essay. Even though "Wireless Security" is far from my studies, the structure is so great that I use it all the time as an example for my own works.


Wireless security

...and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources...
2 Pages(500 words)Essay

Comparing And Contrasting Wireless Security

...?Running head: WEAKEST LINK REVIEW The Weakest Link: A Review of the Literature in Wireless Security Your College The Weakest Link: A Review of the Literature in Wireless Security As Loo (2008) writes, “the strength of a computer system’s security is always measured by its weakest component” (p. 68). While wireless technologies bring a wealth of benefits and mobility for end users, there is always a cost for this convenience. As Leo (2008) and others bear out, these drawbacks can be devastating if the wrong people can gain access. The primary danger that outsiders pose to sensitive information is the mistaken belief that the sensitive...
4 Pages(1000 words)Essay

Wireless Security

...? Wireless Security Introduction Recently, wireless networking has become more affordable, available and easy to use. Wireless technology is becoming more common especially in homes where it has been greatly adopted. A wireless network involves the access of internet by computers without using any cables or wires. This method is convenient because one can work from anywhere in the house or in his business using his or her laptop. It also makes it possible to connect various computers to the internet, which does not require the use of many disorganized wires or cables as can be in wired networks (Onguardonline.gov, 2012). Wireless local area networks (WLANs) have become explosively popular, which have dramatically altered the way... in which...
7 Pages(1750 words)Research Paper

Wireless Security Policy

...? Wireless Security Policy Wireless Security Policy Wireless Security Policy A wireless network may be described as the wireless connectivity of computer networks generally using, but not limited to, radio waves. The connectivity links business enterprises, telecommunication networks and homes while avoiding the costly and labor intensive cabling infrastructures (NIST, 2003). The implementation and administration of radio communication in the wireless networks occurs at the physical layer of the Open Systems Interconnection, or OSI, model (Rus & Donohue, 2010). This paper will address a...
5 Pages(1250 words)Assignment

Wireless Security in Businesses

...Running Head: WIRELESS SECURITY IN BUSINESSES Wireless Security in Businesses of Wireless Security in Businesses At present information and payments could be sent by wireless technology means to consumers at each moment anywhere. Wireless technology enables businesses a brand new channel. Wireless technology project of any organisation facilitate its consumers to formulate retail activities, using their mobile phones, palm pilots, and other hand-held instruments. In uncomplicated expressions, such organisation by switching to wireless technology allows its consumers receive or transmit data from a mobile phone to the organisation's server that links to consumer's account information--and vice versa--via a link supplied... by a...
6 Pages(1500 words)Essay

Wireless Security

...Running head: WIRELESS SECURITY Wireless Security Goes Here al Affiliation Goes Here Wireless Security Introduction A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN. The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is...
15 Pages(3750 words)Essay

Mobile and Wireless Security

...Running head: MOBILE AND WIRELESS SECURITY Mobile and Wireless Security ------------------------------------- Mobile and WirelessSecurity With awareness of the current trend of merging the phone and the PDA answer the following questions:- Q1. What risks do you see these having for corporate data A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular. Since all these devices work on wireless media, obvious vulnerabilities exist....
5 Pages(1250 words)Essay

Accident Investigation

2 Pages(500 words)Essay

Wireless security

...Wireless Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the internet can be both casual and confidential in nature. None the less for any... of the...
2 Pages(500 words)Essay

Wireless security beyond 802.1x

...Wireless Security Beyond 802.1x Grade May 25th Wireless Security Beyond 802.1x 801.11 is a wireless local area network standard that provides better encryption for networks using the 802.11b (Wi-Fi), 802.11g, and 801.11a standards. The 802.11i standard needs the use of new encryption key protocols such as the Temporal Key Integrity Protocol (TKIP) and AES (Advanced Encryption Standard). For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao,...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Wireless Security for FREE!

Contact Us