Nobody downloaded yet

Wireless Security - Essay Example

Comments (0) Cite this document
Summary
A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Wireless Security
Read TextPreview

Extract of sample
"Wireless Security"

Download file to see previous pages For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft. (Johansson et al., 2007)Wi-Fi networks have to be carefully encrypted to prevent unauthorized use. For example, people committing fraud or dealing in illegal materials via the Internet would find advantages in hacking a Wi-Fi network for Internet access that couldn't be traced to the hacker. Meanwhile, hackers have been known to monitor Wi-Fi networks in order to steal financial data and account information.
The answer to Wi-Fi security may lie in "centralized" switches. Originally, Wi-Fi antennas were complex systems that might include networking and security in the same box with the antenna. This means that if a hacker could penetrate one box, entry might be gained to the entire network. (Broch et al., 2007) This is extremely difficult to monitor and prevent in a corporation's building-wide system that might contain hundreds of antennas. Centralized Wi-Fi systems, being sold with great success by relatively new firms such as Aruba Networks, Inc. and competitors Trapeze Networks, Inc. and HP ProCurve (formerly Colubris Networks), use networks of simpler antennas, each containing a minimum of software and circuitry, all controlled from a sophisticated, very secure central switch. This concept greatly enhances security and eases maintenance and monitoring compared to previous generations of Wi-Fi antenna. (Larsson and Hedman, 2006)
As in virtually all wireless technologies, the popular Bluetooth also has security issues to consider. Hackers practicing "bluesnarfing" or "bluebugging" may be able to locate and gather data from Bluetooth-enabled devices. (Perrig & Tygar , 2002)However, the latest models of cell phones from makers such as Nokia have enhanced security measures in place, and software upgrades are often available for older devices in order to enhance security. Nonetheless, additional security concerns surfaced in U.S. news stories claiming that hackers with specially crafted receivers are able to eavesdrop on cell phone conversations on Bluetooth-wireless headsets, or to capture data being transmitted by a Bluetooth-enabled laptop. (Chin, et al., 2002) The Bluetooth Special Interest Group is strongly recommending 16-digit alphanumeric security codes to be set by individual users; such lengthy codes would be much harder to crack than the short codes used by many devices today. (Perrig & Tygar , 2002)
In Japan, a number of wireless companies are offering cell phone models equipped with cutting-edge biometric security devices. Fujitsu Ltd. makes a chip that is now embedded in DoCoMo phones that identifies a user's fingerprint. If the print does not match, the phone doesn't work. Other companies, including Matsushita Electric Industrial Co., NEC Corp. and Sharp Corp. use facial-recognition technology that uses a camera to measure the distance between a user's eyes, nose and mouth. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Security Essay Example | Topics and Well Written Essays - 3750 words”, n.d.)
Wireless Security Essay Example | Topics and Well Written Essays - 3750 words. Retrieved from https://studentshare.org/technology/1502456-wireless-security
(Wireless Security Essay Example | Topics and Well Written Essays - 3750 Words)
Wireless Security Essay Example | Topics and Well Written Essays - 3750 Words. https://studentshare.org/technology/1502456-wireless-security.
“Wireless Security Essay Example | Topics and Well Written Essays - 3750 Words”, n.d. https://studentshare.org/technology/1502456-wireless-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Wireless Security
...?WIRELESS SECURITY Wireless Security affiliation Table of Contents TECHNOLOGY INVOLVED IN WIRELESS NETWORKS 4 WIRELESS TECHNOLOGY:FUTURE TRENDS 5 COMPANIES INVOLVED IN WIRELESS TECHNOLOGY 7 REGULATORY ISSUES IN WIRELESS NETWORK 8 Piggybacking 8 Wardriving 9 Unauthorized Computer Access 9 Evil Twin Attacks 9 Wireless Sniffing 10 Shoulder Surfing 10 WIRELESS SECURITY MANAGEMENT 11 Wireless Network should be Invisible 11 Wireless Network should be renamed 11 Network Traffic should be encrypted 12 Administrator Password should be Changed 12 Online Awareness 12 Connect Using a VPN 13 Disable File Sharing 13 CONCLUSION 14 REFERENCES 14 INTRODUCTION Wireless networking offers wonderful advantages and opportunities to get easy access... to...
12 Pages(3000 words)Research Paper
Wireless security
...and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources...
2 Pages(500 words)Essay
Comparing And Contrasting Wireless Security
...?Running head: WEAKEST LINK REVIEW The Weakest Link: A Review of the Literature in Wireless Security Your College The Weakest Link: A Review of the Literature in Wireless Security As Loo (2008) writes, “the strength of a computer system’s security is always measured by its weakest component” (p. 68). While wireless technologies bring a wealth of benefits and mobility for end users, there is always a cost for this convenience. As Leo (2008) and others bear out, these drawbacks can be devastating if the wrong people can gain access. The primary danger that outsiders pose to sensitive information is the mistaken belief that the sensitive...
4 Pages(1000 words)Essay
Wireless Security
...? Wireless Security Introduction Recently, wireless networking has become more affordable, available and easy to use. Wireless technology is becoming more common especially in homes where it has been greatly adopted. A wireless network involves the access of internet by computers without using any cables or wires. This method is convenient because one can work from anywhere in the house or in his business using his or her laptop. It also makes it possible to connect various computers to the internet, which does not require the use of many disorganized wires or cables as can be in wired networks (Onguardonline.gov, 2012). Wireless local area networks (WLANs) have become explosively popular, which have dramatically altered the way... in which...
7 Pages(1750 words)Research Paper
Wireless Security Policy
...? Wireless Security Policy Wireless Security Policy Wireless Security Policy A wireless network may be described as the wireless connectivity of computer networks generally using, but not limited to, radio waves. The connectivity links business enterprises, telecommunication networks and homes while avoiding the costly and labor intensive cabling infrastructures (NIST, 2003). The implementation and administration of radio communication in the wireless networks occurs at the physical layer of the Open Systems Interconnection, or OSI, model (Rus & Donohue, 2010). This paper will address a...
5 Pages(1250 words)Assignment
Wireless Security in Businesses
...Running Head: WIRELESS SECURITY IN BUSINESSES Wireless Security in Businesses of Wireless Security in Businesses At present information and payments could be sent by wireless technology means to consumers at each moment anywhere. Wireless technology enables businesses a brand new channel. Wireless technology project of any organisation facilitate its consumers to formulate retail activities, using their mobile phones, palm pilots, and other hand-held instruments. In uncomplicated expressions, such organisation by switching to wireless technology allows its consumers receive or transmit data from a mobile phone to the organisation's server that links to consumer's account information--and vice versa--via a link supplied... by a...
6 Pages(1500 words)Essay
Wireless Security Essay
...Your first and sur Your Due Wireless Security Figure A Wireless Network Structure Considering SecurityWireless Networks are widely used both for individual or business purposes. Today the number of Laptops, PDA's and Mobile Phones that use Wireless Communication Technologies is increasing in every minute. PDA's give you the opportunity to access to the internet, check your email and much more. Mobile phones too, they help you to send Multi-Media Messages (MMS, for example photo or MP3 files) to other people with cell phones or individual email addresses. You can also use General Packet Radio Service (GPRS) that is probably provided by...
9 Pages(2250 words)Essay
Mobile and Wireless Security
...Running head: MOBILE AND WIRELESS SECURITY Mobile and Wireless Security ------------------------------------- Mobile and WirelessSecurity With awareness of the current trend of merging the phone and the PDA answer the following questions:- Q1. What risks do you see these having for corporate data A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular. Since all these devices work on wireless media, obvious vulnerabilities exist....
5 Pages(1250 words)Essay
Wireless security
...Wireless Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the internet can be both casual and confidential in nature. None the less for any... of the...
2 Pages(500 words)Essay
Wireless security beyond 802.1x
...Wireless Security Beyond 802.1x Grade May 25th Wireless Security Beyond 802.1x 801.11 is a wireless local area network standard that provides better encryption for networks using the 802.11b (Wi-Fi), 802.11g, and 801.11a standards. The 802.11i standard needs the use of new encryption key protocols such as the Temporal Key Integrity Protocol (TKIP) and AES (Advanced Encryption Standard). For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao,...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Wireless Security for FREE!
Contact Us