StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security of the Wireless Networks at Home and in the Office - Essay Example

Cite this document
Summary
"Security of the Wireless Networks at Home and in the Office" paper argues that there are great expectations that in the coming decade as the number of access points maintain to go up that so will the numbers of protected access points also will go up…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Security of the Wireless Networks at Home and in the Office
Read Text Preview

Extract of sample "Security of the Wireless Networks at Home and in the Office"

With the passage of time, there is explosive development in wireless computing, both in organizations and at home, and this presents totally different security problems. The security problem of Wireless networks is different in homes as compared to organizations. In the organizations' individuals setting up the network sometimes fail to understand the security requirements.

The equipment of wireless networks comes with a default setting configured by the manufacturer. If this default setting is not changed then it gives benefit to hackers. Hackers, who know the default setting, can gain access to a wireless network. In this way, the network fails to require the identification and verification of all users. Many Government and private sector organizations have installed high-speed wireless networks. However, there is substantial variation in the security measures built into these networks.

According to Chris Hurley WarDriving is “the act of moving around a precise area and mapping the population of wireless access points for statistical ideas.” In the definition, Wardriving does not mean driving around in a car. It means to drive around in a specific area for getting an idea about data. Citizens have war driven just by walking around in a region with a PDA, or with the help of a laptop while taking a taxi or the subway. Chris Hurley is one of the originators of the yearly DefCon Wardriving Contest.

The contest now held in Las Vegas, where thousands of people from all over the world meet each year to converse issues concerning among other things wireless security. The first DefCon war drives took place in 2002, and 21 teams participated in having more than eighty contestants. The rules were relatively straightforward; the criteria for awarding points was based on the following based on factors, listed below: - There was one given for every Access Point. - Two extra points for A.P.’s with default SSID and no WEP enabled. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wardriving Legal Issues Essay Example | Topics and Well Written Essays - 750 words, n.d.)
Wardriving Legal Issues Essay Example | Topics and Well Written Essays - 750 words. https://studentshare.org/miscellaneous/1712621-wardriving-legal-issues
(Wardriving Legal Issues Essay Example | Topics and Well Written Essays - 750 Words)
Wardriving Legal Issues Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1712621-wardriving-legal-issues.
“Wardriving Legal Issues Essay Example | Topics and Well Written Essays - 750 Words”. https://studentshare.org/miscellaneous/1712621-wardriving-legal-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security of the Wireless Networks at Home and in the Office

Network Security and Different Ways to Secure Networks

The security of the data, at the most basic level, is authenticated by the users or the network administrators who assign a password and an ID to the respective network so that the security of the network is kept intact The researcher states that assigning a password and an ID to a network is often called one-factor authentication while the two-factor authentication has often been identified when the account or network is secured by a security-token for e.... The Need for Network Security In practice, network security is an important part of many networks at homes, at public places, at colleges and universities and at various offices such as banks, stock exchanges, all kinds of multinational firms and other businesses, law enforcement agencies and even the Government offices and departments where important information is stored....
9 Pages (2250 words) Essay

Wireless Security Policy

The implementation and administration of radio communication in the wireless networks occurs at the physical layer of the Open Systems Interconnection, or OSI, model (Rus & Donohue, 2010).... Wireless Security Policy Overview wireless networks occur in various forms, which are wireless PAN (WPAN), wireless LAN (WLAN), wireless WAN (WWAN), wireless MAN (WMAN), wireless mesh networks and cellular networks.... A wireless network may be described as the wireless connectivity of computer networks generally using, but not limited to, radio waves....
5 Pages (1250 words) Assignment

Wireless Security

hellip; the wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer.... 2007)Wi-Fi networks have to be carefully encrypted to prevent unauthorized use.... Meanwhile, hackers have been known to monitor Wi-Fi networks in order to steal financial data and account information.... Centralized Wi-Fi systems, being sold with great success by relatively new firms such as Aruba networks, Inc....
15 Pages (3750 words) Essay

A Wireless Network Structure Considering Security

This paper "A Wireless Network Structure Considering Security" focuses on the fact that wireless networks are widely used both for individual or business purposes.... Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks.... We will also point to some of the ways crackers use to enter wireless networks and how they can easily bring down even a whole none wireless network via that....
9 Pages (2250 words) Coursework

Wi-Fi Technology: Wireless Fidelity

nbsp;… the wireless networks cost less than the wired connections where cables are required to connect every other computer.... This easiness also allowed the hackers and malicious users to compromise the security of wireless networks.... wireless networks use certain security measure to encrypt their communications data.... In theory, wireless networks are more prone to attacks and are less secure than the wired networks because all the communications are traveling over the air....
10 Pages (2500 words) Essay

Wireless Network Design

Why should one use wireless instead of the traditional wired networks, the advantages, and disadvantages of wireless networks, and the components of the wireless net?... he network can be maintained from any point once someone has the rights and privileges given the roaming features of the wireless network.... As privacy and confidentiality are ensured in the design of the wireless network, the existing services of the organization should be transparent which means they should be available....
4 Pages (1000 words) Essay

Voice over Wireless Fidelity

The equipment of wireless networks comes with a default setting configured by the manufacturer.... Many Government and private sector organizations have installed high-speed wireless networks.... With Wi-Fi, an intact office can be moved, or new staff can be added exclusive of losing the investment in networking installs or moving cables or installing complex hubs and switches.... This paper focuses on the adoption of Wi-Fi for the home consumer and explains some of the important considerations and issues when deciding to implement it....
8 Pages (2000 words) Term Paper

What Are the Different Networks Used in Hotels Contingent to the Location and Hotels Design

Mansfield and Antonakos assert that in the selection of the kind of network to be applied, the hotel's or office's design has to be considered as it enables the professionals to select the kind of network required in the hotels depending on its objectives.... "What Are the Different networks Used in Hotels Contingent to the Location and Hotel's Design" paper addresses the challenges by analyzing the different kinds of networks, which can be used in hotels in contingent to the location and design of the hotel....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us