StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless security - Essay Example

Cite this document
Summary
Categories of Attackers. There are many types of attackers, which intend to harm the networks. Some of the most famous types of attackers include hackers, crackers, script kiddies, spies, employees, and cyber terrorists. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Wireless security
Read Text Preview

Extract of sample "Wireless security"

Categories of Attackers There are many types of attackers, which intend to harm the networks. Some of the most famous types of attackers include hackers, crackers, script kiddies, spies, employees, and cyber terrorists. Selected Attacker Of all these six types of attackers, the one, which I would like to break into my network, is a hacker. The reason is that hackers break into the networks to identify the security holes present in the networks. The aim of the hackers is not to commit theft, destroy, or steal any sort of private information; rather the intention is to make the network administrators improve the security of their networks.

Ciampa (2009) found that a hacker is a person who makes use of advanced programming skills and techniques to break illegally into any specific computer system in order to expose the security flaws (p. 16). Some attackers believe that the act of hacking is ethical because the aim is neither to steal information nor to create any sort of problem for the user of the computer system. If a hacker attacks my personal computer system, it will make me aware that the security features, which I have implemented for the protection of my computer, are not strong enough to combat the attacks of the hackers.

Therefore, I would like a hacker to break into my security wall to identify the security flaws in my system, which will make me improve my security by installing more trustworthy and reliable security features in order to make my computer more safe and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses.

Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources to access the network based on the authentication of the person who wants to access the network. Using access control mechanisms, we can prevent any kind of unauthorized access to our networks.

It is more secure than WEP because some software products are available which can easily crack the security protocols of WEP. Therefore, I feel that access control is the most secure security mechanism, which I would like to use. WEP is an older encryption algorithm used for the secure transfer of data over the network. It is not a current standard of authentication because it has several weaknesses, which the experts still need to overcome. WPA and WPA2 are good replacements for WEP. WPA continuously keeps on changing the key, which makes the data more secure whereas WEP generates a single key, which the network attackers can easily crack.

WPA2 makes use of AES for encryption, which is more secure than RC4 encryption used by WEP. References Ciampa, M. (2009). Security+ Guide to Network Security Fundamentals (3rd ed.). Boston, MA: Cengage Learning. Smith, S. (n.d.). What are Access Control Systems?. Wisegeek.com. Retrieved from http://www.wisegeek.com/what-are-access-control-systems.htm

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless security Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1415520-wireless-security
(Wireless Security Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1415520-wireless-security.
“Wireless Security Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1415520-wireless-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless security

Wireless Security in Businesses

Wireless security is at least as good quality as Internet security.... Impending technologies and values will create Wireless security better than wireline security.... In addition, work by industry conglomerates sketches new Wireless security methodologies that deal with the central issues surrounding Wireless security.... Wireless security systems ought to be technology-agnostic.... That's for the reason that security is being addressed in the early days of wireless communications....
6 Pages (1500 words) Essay

Mobile and Wireless Security

Thus there exists a requirement to formulate and implement a Wireless security policy to disallow unauthorized access to the corporate networks using wireless media and allow only approved and authenticated users to be connected.... Increased usage of mobile devices by the work forces in corporate calls for implantation of security measures in wireless networks.... hellip; Since all these devices work on wireless media, obvious vulnerabilities exist....
5 Pages (1250 words) Essay

Wireless Security Best Practices Guide for Business

Forget about the new trends, managing and maintaining the existing ones is so important that any misuse… Keeping this in mind every organization is in search of a good security policy to be jotted down which when followed keeps the company in safe hands.... This paper is all about the security policy which Every company in today's world is run on wireless network technology.... As it is defined in RFC 2196, the IETS's site security Handbook, a security policy is a formal set of rules through which people who are given access to organization's technology and information assets must abide to....
9 Pages (2250 words) Essay

Balance between wireless security and performance

Although they have been accepted as convenient, the wireless… The Wireless security systems have been scrutinized as being restricted in terms of performance.... Studies have indicated that eavesdropping is quite easier in the Wireless security than in the Local Area Network.... The Wireless security systems have been scrutinized as being restricted in terms of performance.... Studies have indicated that eavesdropping is quite easier in the Wireless security than in the Local Area Network....
2 Pages (500 words) Thesis Proposal

Wireless security beyond 802.1x

1 Wireless security has been safeguarded with the use of 802.... 1 Wireless security (Gao, Zheng & Lu, 2015).... The technologies include Wireless security Beyond 802.... x Grade May 25th Wireless security Beyond 802.... 1 Wireless security has been safeguarded with the use of 802.... 1 Wireless security (Gao, Zheng & Lu, 2015).... x technology as the foundation of Wireless security....
2 Pages (500 words) Essay

Wireless Security Mechanisms

This essay "Wireless security Mechanisms" focuses on the information being communicated with the help of a network is absolute without any physical constraints.... As of the start of wireless networking, malicious users can move in the streets in their vehicles to carry out 'wardriving' to find out vulnerable wireless networks.... Driving around a business complex or a neighborhood with a wireless-enabled laptop computer, help in connecting to and recording any number of corporate and private networks....
6 Pages (1500 words) Essay

Wireless Security Policy

The paper "Wireless security Policy" discusses that the notion of Wireless security policy is principally viewed to be the basis of an organizations' information security.... Thus, it can be affirmed that First Northern Bank prioritizes strengthening Wireless security policy in order to make its online banking procedure much safer for the users.... fter acquiring a brief idea about the notion of Wireless security policy, it can be affirmed that the prime purpose of this policy is to forbid the deployment of unsecured and open wireless network access environments (CSIT, 2008)....
5 Pages (1250 words) Assignment

Wireless Network Security Appliances

Wireless security appliancesDFL-CPG310 Wireless firewall/VPN security applianceDFL-CPG310 provides security to the network by acting as a Firewall to the network, so that packets do not intrude into the network.... There has been the need to have security in the wireless networks with the increase in the wireless devices which have been Abstract With the advent of many wireless technologies, there are many attacks that are geared towards wireless networks.... There has been the need to have security in the wireless networks with the increase in the wireless devices which have been introduced into the market....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us