StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Wireless Network Security Issues - Report Example

Cite this document
Summary
The report "Wireless Network Security Issues" focuses on the critical, and thorough analysis of the major issues in wireless network security. Wireless networking technology, once confined to the realm of high technology, is growing more and more prevalent…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful

Extract of sample "Wireless Network Security Issues"

Download file to see previous pages

Techniques such as Wired Equivalent Privacy, or WEP, are easy to support and implement but be trivial to circumvent through widely available techniques (Bangeman, p. 1). The newer Wi-Fi Protected Access, or WPA, and its extension WPA2 have shown themselves to be much more secure than WEP, but are unsupported by many early 802.11 devices.

More traditional means of security are also commonly employed with wireless networking. Minimizing the range of a wireless network past its range of use helps minimize unintended access, as it only allows devices that have been specifically authorized. As with all security, one must take care to balance ease of use and convenience with preventing unauthorized access or use. This paper will look at the most common types of wireless network security, as well as the relative level of support and steps involved in implementation.

At the lowest level, computer networking is made up of pieces of data, known as packets. Each packet contains a header stating its destination and the type of data it contains, with the remainder of the packet occupied by the actual data that is being transmitted. Wireless networking operates by the same concept, transmitting packets between two devices. Though the concept is simple, many different ways to accomplish it were created, with different solutions almost always being incompatible.

After many years of various vendor-specific solutions, the Institute of Electrical and Electronics Engineers, or the IEEE, began to look into creating a unified standard for wireless networking in the mid-1990s. IEEE created the 802.11 specification, which describes how wireless short-range communications should be carried out over the 2.5ghz, 3.4ghz, and 5ghz frequencies. The maximum supported data rate described by 802.11 is 2 megabits/second. The specification failed to become widely adopted and is now unsupported.

The first widely adopted amendment to 802.11 was 802.11b. 802.11b was completed in 1999 and amended in 2001 and is still commonly used and supported thanks to the backward compatibility of future amendments to the 802.11 specifications. 802.11b, though prone to interference, includes a variety of methods such as data rate throttling to gracefully handle interference (802.11b-1999 6). 802.11b also supports 11 channels at 25mhz intervals, minimizing interference in areas with a high density of networks. 802.11b supports a theoretical rate limit of 11 megabits/second, although 5 megabits/second is a more reasonable estimate of actual speed when real-world interference is introduced (802.11b-1999 11).

The next major amendment to 802.11 was 802.11g, which was completed in 2003 and is the most commonly used wireless networking technology as of 2009. 802.11g represented a shift in technique for the 802.11 standards, switching to the use of Orthogonal frequency-division multiplexing, or OFDM, for its modulation (802.11g-2003 10). Earlier versions of the protocols used Complementary Code Keying, or CCK, a technology that while error resistant required the serial transmissions of all data (802.11b-1999 16). OFDM multiplexes the spectrum allowing for data to be sent in parallel and increasing the overall speed of transmission. 802.11g supports CCK and will fall back to it when an 802.11b client connects to an 802.11g network (802.11g-2003 13). CCK is also more interference-resistant, so 802.11g will also revert to CCK in cases of high interference.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless Network Security Report Example | Topics and Well Written Essays - 3250 words, n.d.)
Wireless Network Security Report Example | Topics and Well Written Essays - 3250 words. https://studentshare.org/information-technology/2043562-wireless-network-security
(Wireless Network Security Report Example | Topics and Well Written Essays - 3250 Words)
Wireless Network Security Report Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/information-technology/2043562-wireless-network-security.
“Wireless Network Security Report Example | Topics and Well Written Essays - 3250 Words”. https://studentshare.org/information-technology/2043562-wireless-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Network Security Issues

Wireless technology security

Wireless Technology Security A wireless network refers to the type of computer network not connected by any cables (Tse & Viswanath, 2005).... Wireless Technology Security A wireless network refers to the type of computer network not connected by any cables (Tse & Viswanath, 2005).... This paper will discuss various wireless network types and security protocols.... Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures....
6 Pages (1500 words) Research Paper

A Wireless Network Structure Considering Security

However, wireless networking has many security issues.... " It also provides "top 10 tips for wireless home network security".... This paper "A wireless network Structure Considering Security" focuses on the fact that Wireless Networks are widely used both for individual or business purposes.... We will also point to some of the ways crackers use to enter wireless networks and how they can easily bring down even a whole none wireless network via that....
9 Pages (2250 words) Coursework

Forensic Computing and Identity Theft

Common ID theft crimes and security issues are discussed to have a clear view of what steps have been taken to ensure the consumer's data protection.... Social, ethical, and moral issues regarding identity theft have been discussed both from the user's and the investigator's side.... Before going into the niceties of ethical, moral, and social issues vis-à-vis identity theft in forensic computing, let's first get introduced to what forensic computing actually is and what is identity theft....
16 Pages (4000 words) Essay

Wireless Network Design

This papper ''wireless network Design'' tells that The wireless network is where users access the internet without using cables.... The users have different operating systems but are still able to connect via the wireless network.... A wireless network offers the same internet access as the wired internet but without the process of drilling into the walls to fix the Ethernet cables and laying of the cables.... The paper also looks at the configurations for the wireless network....
4 Pages (1000 words) Essay

Common Identity Theft Crimes

Common ID theft crimes and security issues are discussed.... Then, social, ethical and moral issues have been discussed.... Financial crimes mainly take account of the misuse of the victim's credit card information, bank account information, social security number, or insurance information....
9 Pages (2250 words) Research Paper

GSM Phone Security

The writer of the paper 'GSM Phone security' states that there are specific attacks that can be done on the GSM phone.... The A5/3 is the most recent standard and has proven to better than the previous standards in terms of security but has its loopholes too.... This is a loophole that can be a security threat to the company as the CEO uses the phone for all her conversations as well as email communication....
10 Pages (2500 words) Coursework

The Security Mechanism for IEEE 802.11 Wireless Networks

This case study "The security Mechanism for IEEE 802.... 1 Wireless LAN's security mechanisms.... They have recently become so popular due to their ability to provide mobility, flexibility and security.... 1 architecture can be used to employ security to the wireless networks.... 1 security mechanisms are the first and most effective and reliable ways to secure wireless networking.... 1 Wireless LAN's security mechanisms....
10 Pages (2500 words) Case Study

Security in Wireless Network

Issues of network security are currently becoming essential as society is in the movement towards the age of digital information.... The emergence of the security protocol as well as IT Governance has played a great role in ensuring network security (Xiao, Shen, X, & Du, 2011).... The system of network security relies on the protection layers and comprises numerous constituents including security software and networking besides appliances and hardware....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us