Nobody downloaded yet

Wireless Security - Essay Example

Comments (0) Cite this document
Summary
Wireless Networks are widely used both for individual or business purposes. Today the number of Laptops, PDA's and Mobile Phones that use Wireless Communication Technologies is increasing in every minute. PDA's give you the opportunity to access to the internet, check your email and much more…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Wireless Security Essay
Read TextPreview

Extract of sample
"Wireless Security"

Download file to see previous pages You can simply use Laptop, PDA or Cell Phones to establish connection to each other via Bluetooth. These devices all give you the ability to "enter a network mobile which has many benefits for you. However, wireless networking has many security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks."1
"An increasing number of government agencies, businesses, and home users are using, or considering using, wireless technologies in their environments. Agencies should be aware of the security risks associated with wireless technologies. Agencies need to develop strategies that will mitigate risks as they integrate wireless technologies into their computing environments. This document discourses some common wireless technologies in brief, outlines the risks in relation to them and will offer some guidance for mitigating those risks. "2 It also provides "top 10 tips for wireless home network security"3. We will also point to some of the ways crackers use to enter wireless networks and how they can easily bring down even a whole none wireless network via that.
No physical connection is established between the devices in a wireless network. No cable or wire to joint two devices to each other or one device to a network. All devices connect through radio frequencies to transmit the data. Wireless technology may involve complicated systems such as Wireless Local Area Networks known as WLAN. It may also include simple devices that do not have a storage system such as wireless headphones and microphones. Devices with Infra-Red technology are also involved such as a wireless mouse or a remote controller.
Wireless Networks help implementing a mechanism to transmit data between devices and also inside the devices. These networks are categorized into three main groups. Wireless Wide Area Networks or WWAN for example GSM (Global System for Mobile Communications), Wireless Local Area Networks or WLAN and Wireless Private Area Networks known as WPAN technology for example Bluetooth.

Figure 2: A Wireless Wide Area Network (WWAN)
Mainly, the devices that use wireless technology are the devices that can be carried easily from one place to another such as Laptop computers, Personal Digital Assistants (PDA's) and Cell Phones. "Many laptop computers have wireless cards pre-installed for the buyer." 4
"PDAs are data organizers that are small enough to fit into a shirt pocket or a purse. PDAs offer applications such as office productivity, database applications, address books, schedulers, and to-do lists, and they allow users to synchronize data between two PDAs and between a PDA and a personal computer. Newer versions allow users to download their e-mail and to connect to the Internet."5

Figure 3: A Wireless LAN
There are two standards for wireless technology, IEEE 802.11 developed by IEEE in 1997. It is a standard for data transmission in WLANs. "802.11 is the original WLAN standard, designed for 1 Mbps to 2 Mbps wireless transmissions. The 802.11b standard is currently the dominant standard for WLANs, providing sufficient speeds for most of today's applications. Because the 802.11b standard has been so widely adopted, the security weaknesses in the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Security Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/technology/1505700-wireless-security-essay
(Wireless Security Essay Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/technology/1505700-wireless-security-essay.
“Wireless Security Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/technology/1505700-wireless-security-essay.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Wireless security
...and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources...
2 Pages(500 words)Essay
Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter
...?Running Head: CRITIQUE ON WIRELESS HOTSPOTS Critique Position on the article “Wireless Hotspots: Petri Dishes of Wireless Security” by Bruce Potter Students Name Course Name Instructor Date Critique / Position on the article: “Wireless Hotspots: Petri Dishes of Wireless Security” by Bruce Potter This article by Bruce Potter takes the position that security over a typical wireless (Wi-Fi) hotspot network is not achievable at the current state of technology, at least at the small scales of individual and small business usage. However, large corporations with the infrastructure to create...
4 Pages(1000 words)Essay
Comparing And Contrasting Wireless Security
...?Running head: WEAKEST LINK REVIEW The Weakest Link: A Review of the Literature in Wireless Security Your College The Weakest Link: A Review of the Literature in Wireless Security As Loo (2008) writes, “the strength of a computer system’s security is always measured by its weakest component” (p. 68). While wireless technologies bring a wealth of benefits and mobility for end users, there is always a cost for this convenience. As Leo (2008) and others bear out, these drawbacks can be devastating if the wrong people can gain access. The primary danger that outsiders pose to sensitive information is the mistaken belief that the sensitive...
4 Pages(1000 words)Essay
Wireless Security in Businesses
...Running Head: WIRELESS SECURITY IN BUSINESSES Wireless Security in Businesses of Wireless Security in Businesses At present information and payments could be sent by wireless technology means to consumers at each moment anywhere. Wireless technology enables businesses a brand new channel. Wireless technology project of any organisation facilitate its consumers to formulate retail activities, using their mobile phones, palm pilots, and other hand-held instruments. In uncomplicated expressions, such organisation by switching to wireless technology allows its consumers receive or transmit data from a mobile phone to the organisation's server that links to consumer's account information--and vice versa--via a link supplied... by a...
6 Pages(1500 words)Essay
Wireless Security
...Running head: WIRELESS SECURITY Wireless Security Goes Here al Affiliation Goes Here Wireless Security Introduction A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN. The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is...
15 Pages(3750 words)Essay
Mobile and Wireless Security
...Running head: MOBILE AND WIRELESS SECURITY Mobile and Wireless Security ------------------------------------- Mobile and WirelessSecurity With awareness of the current trend of merging the phone and the PDA answer the following questions:- Q1. What risks do you see these having for corporate data A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular. Since all these devices work on wireless media, obvious vulnerabilities exist....
5 Pages(1250 words)Essay
Wireless Security Best Practices Guide for Business
...WIRELESS SECURITY BEST PRACTICES GUIDE FOR BUSINESS INDEX TABLE OF CONTENTS PAGE NO INTRODUCTION 2 2. WIRELESS DEVICES 2 3. TECHNICAL CONFIGURATION OF WIRELES DEVICES 2 4. PHYSICAL LAYER SECURITY 3 5. TRAINING FOR WIRELESS ACCESS 3 6. GUEST PRIVILEGES 3 7. SECURE DEFAULT CONFIGURATION OF DEVICES 3 8. REQUESTING FOR WIRELESS NETWORK 4 9. AUTOMATIC DISCOVERY OF NETWORK 4 10. PROCUREMENT OF NETWORKS 4 11. AVOID PROCESSING SENSITIVE DATA 4 12. APPROVED PERSONNEL ONLY 5 13. LOGICAL AND PHYSICAL SECURITY OF ACCESS POINTS 5 14....
6 Pages(1500 words)Essay
Wireless Network Security
...As the attractiveness of wireless networks amplifies, wireless network security has grown to be debatable topic in the recent years. As organizations are relying more on high-speed wireless networks, security is a vital factor. Wireless security is a framework that emphasizes on prevention of workstations or networks from unauthorized access. An automated system known as mobile ad-hoc network (MANET) is integrated within the wireless networks to establish communication between wireless nodes or access points. However, MANET does not have centralized administration. MANET is defined as...
7 Pages(1750 words)Essay
Wireless security
...Wireless Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the internet can be both casual and confidential in nature. None the less for any... of the...
2 Pages(500 words)Essay
Wireless security beyond 802.1x
...Wireless Security Beyond 802.1x Grade May 25th Wireless Security Beyond 802.1x 801.11 is a wireless local area network standard that provides better encryption for networks using the 802.11b (Wi-Fi), 802.11g, and 801.11a standards. The 802.11i standard needs the use of new encryption key protocols such as the Temporal Key Integrity Protocol (TKIP) and AES (Advanced Encryption Standard). For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao,...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Wireless Security Essay for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us