StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless security - Essay Example

Cite this document
Summary
As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferred choice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Wireless security
Read Text Preview

Extract of sample "Wireless security"

Wireless Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable.

The activities performed by user on the internet can be both casual and confidential in nature. None the less for any of the activities performed over the internet every user wants privacy and security. Security of the connection ensures the integrity and originality of the data and assures the user that his information is safe. Wireless connection employ the use of radiowaves for communication and flow of data between the devices. These radiowaves can easily be tapped, intercepted and the information can be read or stolen and even in some case altered and manipulated hence raising the concern of data integrity and originality.

Facing the threats that came with the increasing and rapid growth in the number of users of wireless technology the requirements for development of measures for security and integrity of data and network also arose. Although number of people were lazy and most of them were unaware of the security threats they faced using wireless form of connections, such people were only concerned about the availability of the internet and were satisfied as long as they were able to operate the internet. Now to ensure security while using wireless connections various forms of security were developed which included WEP,WAP and WAP2 etc.

WEP - Wired Equivalent Privacy (or Wireless Encryption Protocol), was introduced as the first line of security to tackle the threats that were occurring. It was a weak option for security as it only had encryption to a basic level. After the passage of time a lot of weaknesses were found in it and did not remain as secure as it was thought earlier. It did not provide end to end protection as it only used at the two lowest layers of OSI. Later on it was found out that it didn’t protect packets from being intercepted and any hacker could get enough stream of packets which would be enough for him to extract the encryption scheme.

After significant flaws were found in WEP another technology WPA - ( Wi-Fi Protected Access ) was introduced. Many of the problems that remained undetected by WEP were addressed by this new WPA technology. It offers a more stronger encryption methodology. But it requires all of the devices to be WPA enabled to operate else the device which is not enabled will fall back on the lesser secure WEP module. In WPA you use a simple English paraphrase between 8 to 63 characters long and using a technology called TKIP for each wireless client a unique encryption key is generated.

Ultimately it is many times better and more secure than WEP.WPA2™ (Wi-Fi Protected Access® 2) is even a more secure technology introduced after WPA which allows the network administrators the guarantee and assurance that network can only be accessed by such personnel who have special permission to access it. It provide security which employees use of algorithms such as National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm. Hence making it even a more secure technology.

Works CitedBetween, T. D. (n.d.). Differences Between. Retrieved from http://www.differencebetween.net/technology/difference-between-wep-and-wpa/Boncella, R. J. (n.d.). WIRELESS SECURITY: AN OVERVIEW. Retrieved from Washburn university: http://www.washburn.edu/faculty/boncella/WIRELESS-SECURITY.pdfWebopedia. (n.d.). The Difference between WEP and WAP. Retrieved from Webopedia: http://www.webopedia.com/DidYouKnow/Computer_Science/2007/WEP_WPA_wireless_security.asp

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless security Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Wireless security Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from https://studentshare.org/information-technology/1578308-wireless-security
(Wireless Security Essay Example | Topics and Well Written Essays - 500 Words - 2)
Wireless Security Essay Example | Topics and Well Written Essays - 500 Words - 2. https://studentshare.org/information-technology/1578308-wireless-security.
“Wireless Security Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d. https://studentshare.org/information-technology/1578308-wireless-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless security

Wireless Security Policy

hellip; wireless security Policy.... This paper will address a wireless security policy for a medium sized banking organization, highlighting the policy overview, purpose, scope, applicability and security requirements.... wireless security Policy Overview Wireless networks occur in various forms, which are wireless PAN (WPAN), wireless LAN (WLAN), wireless WAN (WWAN), wireless MAN (WMAN), wireless mesh networks and cellular networks.... Regardless of the way access is allowed, it is essential that the scope of access is determined and defined clearly in the bank's wireless security policy and implementation (Pahlavan & Krishnamurthy, 2009)....
5 Pages (1250 words) Assignment

Wireless Security in Businesses

wireless security is at least as good quality as Internet security.... Impending technologies and values will create wireless security better than wireline security.... In addition, work by industry conglomerates sketches new wireless security methodologies that deal with the central issues surrounding wireless security.... wireless security systems ought to be technology-agnostic.... That's for the reason that security is being addressed in the early days of wireless communications....
6 Pages (1500 words) Essay

Mobile and Wireless Security

Thus there exists a requirement to formulate and implement a wireless security policy to disallow unauthorized access to the corporate networks using wireless media and allow only approved and authenticated users to be connected.... Increased usage of mobile devices by the work forces in corporate calls for implantation of security measures in wireless networks.... hellip; Since all these devices work on wireless media, obvious vulnerabilities exist....
5 Pages (1250 words) Essay

Balance between wireless security and performance

Although they have been accepted as convenient, the wireless… The wireless security systems have been scrutinized as being restricted in terms of performance.... Studies have indicated that eavesdropping is quite easier in the wireless security than in the Local Area Network.... The wireless security systems have been scrutinized as being restricted in terms of performance.... Studies have indicated that eavesdropping is quite easier in the wireless security than in the Local Area Network....
2 Pages (500 words) Thesis Proposal

Wireless security beyond 802.1x

1 wireless security has been safeguarded with the use of 802.... 1 wireless security (Gao, Zheng & Lu, 2015).... The technologies include wireless security Beyond 802.... x Grade May 25th wireless security Beyond 802.... 1 wireless security has been safeguarded with the use of 802.... 1 wireless security (Gao, Zheng & Lu, 2015).... x technology as the foundation of wireless security....
2 Pages (500 words) Essay

Wireless Security Mechanisms

This essay "wireless security Mechanisms" focuses on the information being communicated with the help of a network is absolute without any physical constraints.... As of the start of wireless networking, malicious users can move in the streets in their vehicles to carry out 'wardriving' to find out vulnerable wireless networks.... Driving around a business complex or a neighborhood with a wireless-enabled laptop computer, help in connecting to and recording any number of corporate and private networks....
6 Pages (1500 words) Essay

Wireless Security Policy

The paper "wireless security Policy" discusses that the notion of wireless security policy is principally viewed to be the basis of an organizations' information security.... Thus, it can be affirmed that First Northern Bank prioritizes strengthening wireless security policy in order to make its online banking procedure much safer for the users.... fter acquiring a brief idea about the notion of wireless security policy, it can be affirmed that the prime purpose of this policy is to forbid the deployment of unsecured and open wireless network access environments (CSIT, 2008)....
5 Pages (1250 words) Assignment

Wireless Network Security Appliances

wireless security appliancesDFL-CPG310 Wireless firewall/VPN security applianceDFL-CPG310 provides security to the network by acting as a Firewall to the network, so that packets do not intrude into the network.... There has been the need to have security in the wireless networks with the increase in the wireless devices which have been Abstract With the advent of many wireless technologies, there are many attacks that are geared towards wireless networks.... There has been the need to have security in the wireless networks with the increase in the wireless devices which have been introduced into the market....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us