Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Security in Wireless LAN - Essay Example

Comments (0) Cite this document
Before venturing onto the security aspect it will be worthwhile here to have a glimpse of setting up a reliable and efficient network. The primary objective of setting up a WLAN is to increase the mobility and broaden the scope of work-area. Non-existence of wiring blues also tilts the balance in favor of WLAN…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Security in Wireless LAN
Read TextPreview

Extract of sample "Security in Wireless LAN"

Download file to see previous pages are some of the well known access points.
Antenna: It determines the reach of the WLAN. It is basically a transceiver i.e. receiving as well as transmitting the signals. Antenna takes directions from the wireless network interface card of the computer.
Laptop/ Desktop systems: Since WLAN is basically designed for mobility, therefore Laptop happens to be the best companion to work with the help of network. The laptop must be having a wireless network interface PCMCIA card for WLAN compatible. Wireless network interface cards work with a 48-bit MAC address associated with them. This address is completely unique to each card.
Security settings: For a low end access point, security is generally limited to using WEP encryption technique and MAC address filters. MAC address filtering is used to limit the number of hardware components that can access the wireless network. For a higher end transmitter, like used for a corporate set-up Temporal Key Integrity Protocol (TKIP) is used. This offers better security than WEP. TKIP offers new encryption algorithms every now and then, and keeps changing the encryption keys making it more difficult for a network hacker to sniff them.
...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security in Wireless LAN Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from
(Security in Wireless LAN Essay Example | Topics and Well Written Essays - 3000 Words)
“Security in Wireless LAN Essay Example | Topics and Well Written Essays - 3000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Wireless Security

On the other hand, there are countless security and privacy issues also emerging in wireless networking environments. Though, the new technologies require more and more high level application of wireless communication networks, but such implementations are being established without giving significant concentration to privacy and security related issues. Consequently, the majority of wireless networks around the world are in danger regarding security and safety. Thus, there are a lot of chances that someone with appropriate equipment could be able to spy network traffic. In this scenario, they can get access to users’ passwords and other data (Gerkis, 2006; The State University of New Jersey, 2006).
In addition, these securit...
12 Pages(3000 words)Research Paper

Essential Components of a Wireless Security Policy, the Difference of Wireless and Wired LAN Security Policy

... icon that will enable the wireless device to connect to the wireless local area network be done by the organization’s system administrators. This is to ensure that no rider or malicious codes accompany the authentication process of the wireless device as it connects to the wireless local area network. In some instances the organization’s wireless security policy only allows the devices supplied by the organization to connect to its wireless local area network. The security policy also mandates that the local virus protection system of the wireless devices is up to date. III. The Difference of Wireless and Wired LAN Security Policy The policy governing wireless communication in a local area network is different in the sense that. Wireless...
3 Pages(750 words)Research Paper

Wireless security

... and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources to access the network based on the authentication of the person who wants to access the network. Using...
2 Pages(500 words)Essay

Wireless Security

... when long secret keys are used (, 2008 & Ciampa, 2009). Wired Equivalent Privacy (WEP) Protocol is a fundamental security aspect in the IEEE 802.11 standard, which is intended to offer privacy over a wireless network through encryption of data sent over the network. However, WEP should not be considered a comprehensive security solution just as is the case in physical security in the wired LAN. This is because it has been discovered that automated tools can be used to crack a WEP key in a few minutes (, 2010). Therefore, extra security mechanisms should be used to supplement the system. These may include authentication, access control, password protection, end-to-end encryption, firewalls and effective private...
7 Pages(1750 words)Research Paper

Wireless LAN Technology and its construction

... that is possible with them. While some of the standards are stable and are usable in multiple environments, it is not the same with equipments that comply to a different standard. The report also presents advantages - disadvantages map between the standards that are existing and the reason why there is so many. We have also listed the security issues that plague the usage of WLANs. Status of Wireless LAN technologies Wireless LAN was and continues to be sought after because of some of the problems that are faced by LAN administrators and the users1. Typically the problems faced are: 1. Users are mobile and do not have network points available where ever they go. Particularly in public places like the airport, the hotels, etc., where...
10 Pages(2500 words)Essay

Wireless Security

...Running head: WIRELESS SECURITY Wireless Security Goes Here al Affiliation Goes Here Wireless Security Introduction A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN. The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides. Bluetooth and Wi-Fi--two of the hottest wireless technologies--can provide businesses with enhanced connectivity...
15 Pages(3750 words)Essay

Wireless security

...Wireless Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the internet can be both casual and confidential in nature. None the less for any...
2 Pages(500 words)Essay

WIred LAN Versus Wireless

Client’s 24 May Wired or Wireless The physical cabling is the biggest difference between wired and wireless communication infrastructure, wireless infrastructure is free from cables, and on the contrary a wired communication infrastructure comes with cables and a lot of hassles. There is not much to explain about the two, the main differences are self-explanatory. A wireless network makes use of radio waves to communicate and on the other hand wires are used in the case of wired communication. When it comes to setting up and troubleshooting, it is believed that wired networks are much better than wireless ones, wireless networks are difficult to set up and troubleshooting is also very difficult, it is much different in the case of...
2 Pages(500 words)Assignment

Wireless security beyond 802.1x

...Wireless Security Beyond 802.1x Grade May 25th Wireless Security Beyond 802.1x 801.11 is a wireless local area network standard that provides better encryption for networks using the 802.11b (Wi-Fi), 802.11g, and 801.11a standards. The 802.11i standard needs the use of new encryption key protocols such as the Temporal Key Integrity Protocol (TKIP) and AES (Advanced Encryption Standard). For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao, Zheng & Lu, 2015). The technologies include the IPsec VPN and 802.1x. However, many consider the IPsec an improvement on the 802.1x. However, to ascertain...
2 Pages(500 words)Essay

Wireless LAN Technology

...The IEEE 802.11 Wireless LAN Technology (College) Introduction Wireless local area network also termed as WLAN is one of the most commonly used technologies in the contemporary society. This is because the IEEE 802.11, the WLAN and technologies associated to them allow high-speed wireless network access which is secured as well as accessing a network infrastructure through mobile connection [1]. The IEEE is responsible for the development of 802.11 family specifications for the WLAN technology. One of the greatest advancements that has been brought forth by the IEEE 802.11 standards if the advanced Wi-Fi (IEEE 802.11b) which has gained popularity amongst all WLAN users. The implementation of the IEEE 802.11 wireless LAN technology is based...
10 Pages(2500 words)Coursework

Security System In Reference To Immigration

 When James Hollifield delivered this paper at the 1989 Annual Meeting of the American Political Science Association barely three months before the descend of the Berlin Wall he seemed to foretell the crisis situation which the member states of the European Union (at that time the European Community) and the United States would visage when coming to terms with the unprecedented international migration flows they experienced in the early 1990s. With the collapse of communism in Europe and the subsequent rise of irredentist and nationalist tendencies on a global scale, both Western Europe and the United States were faced with the challenge of sustained wide-scale migration flows into their territory throughout the early half of...
11 Pages(2750 words)Report

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages(1500 words)Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Security Options

...Security options The Computer Security concentration focuses on basic security matters that occur in the design, study, and execution of distributed systems.  This concentration offers in-detail coverage of the hypothesis and relevance of identity, authentication, access control, auditing, appraisal and avoidance of software vulnerabilities, and cryptography, in the perspective of modern enterprise-scale and web-based systems. Setting up a corporate security policy is one of the vital steps in establishing a strong and secured organizational context. Even though the guidelines that require to be taken may be strenuous, they are essential to the progress and security of the whole institution. There are various motives to establish written...
8 Pages(2000 words)Assignment

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages(2000 words)Case Study

Comprehensive Security Plan

...Comprehensive security plan Comprehensive security plan Introduction This paper is designed to look into the security plan of New York public library. The library has almost 53 million items. Thus, it is the second largest public library in the entire United States. It is independently managed NGO which has both private and public financing. The library has affiliations with other academic and also professional libraries in New York. The various branches of the library are open to the members of the public. It was established in 1895 The body of the paper covers the various aspects of detailed security plan with the different areas appropriately covered. The New York public library has a very small security force operating within...
7 Pages(1750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security in Wireless LAN for FREE!

Contact Us