A wireless network is a wireless communication system that allows electronic devices and computing workstations communicate and exchange data with each other by utilizing radio waves as the transmission medium. Wireless networking offers many advantages for organizations and users such as increased productivity, portability and flexibility, and lower installation costs. However, wireless networking is also coupled with security threats that can alter and damage an organization’s computing and networking resources. Using effective network management can help prevent attacks from occurring by having a sound and thorough assessment of potential security risks and develops guidelines that will mitigate the identified threats. This paper will discuss …show more content…
This paper will also discuss several methods to mitigate and protect a wireless network against security attacks.
Introduction
The expansion of wireless networks has abundantly increased in corporate and home environments in the last decade. Wireless networking cards have been installed on many devices such as laptops, tablets, smartphones, and even kitchen’s devices. Wireless network technology offers many advantages because of the increased accessibility of information resources. The popularity of wireless networks is primarily due to their convenience, cost efficiency, and ease of integration with network components. Even though wireless networking technology has many benefits, it also has its share of disadvantages. When new cyber-attacks are created they can potentially threaten the security of a wireless network. As the deployment of wireless networking increases, security loopholes have presented cyber hackers with many opportunities. The issues that wireless networks presents to network managers include unauthorized access, broadcasted service set identifiers (SSIDs), unknown stations, and spoofed media access
Segmenting the wireless network from the wired network though, is not only a trust issue, wireless networks suffer from many attacks such as Denial of Service caused by interference. The access point that will provide wireless access will be connected to a wired switch, however the separation of the wireless network is proposed to be done with the use of virtual LANs. VLANs will separate the network to two logical networks operating on the same physical network. This separation will enchant network’s security as the main network will be inaccessible from customers as well as it will not be affected if the wireless network is facing issues. The AP must be using Wi-Fi Protected Access 2 (WPA2) security protocol that has advanced encryption standards comparing to
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Properly secure wireless systems: - To prevent data breaches it is very important to secure wireless networks. WI- Fi network security is necessary because it is very easy to hack the data and unauthorized access. Breaches can be prevented by using strong passwords, encryption methods, and strong verification.
G in 1G, 2G, 3G and 4G stands for the “Generation” of the mobile network. Today, mobile operators have started offering 4G services a higher number before the ‘G’ means more power to send out and receive more information and therefore the ability to achieve a higher efficiency through the wireless network. During the time of 1G, radio signals were transmitted in ‘Analogue’ form. 2G networks on the other hand, were based on narrow band digital networks. The 3rd generation of mobile networks has become popular and users access the Internet over devices like mobiles and tablets. This means a 3G network actually allows for more data transmission and therefore the network enables voice and video calling, file transmission, internet surfing, online TV, view high definition videos, play games and much more. 4th Generation mobile networks are believed to provide many value added features.
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
Wi-Fi facilitates ease of use and is getting increasingly popular with homes and businesses. Multiple Wi-Fi Access Points can be located in a given area. Wi-Fi security issues continue to be a problem, as the number of Access Points grows.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks.
While the conventional desktop PC will still continue to serve important functions at both consumer and professional levels, there is an expectation that mobile devices will become the predominant form for accessing both personal and professional content; it is understandable that cyber criminals have begun focusing on mobile devices which have at the same time grown their user base while substantially consolidating the operating system variants which makes the surface area for a potential attack substantially larger (Juniper Networks, n.d.).... ... middle of paper ... ... Mobile Device Security: A Survey of Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. International Journal of Computer Applications.
Recent advances in wireless technology provide the security of blocking the attackers and also need to eliminate the attackers in the network. But in this paper providing the new technique to handle the attacker using an duplicated data as an backbone and also using dynamic key management in this system to providing the more security of the data’s in the wireless sensor network (WSN). So attackers are get confused to finds the original data’s. They don’t know the original data’s are safely send to the base station.
The world has gone through a lot of changed as time passes by. With advancements in the technological field people are can communicate with ones from around the world without having to even lift a finger. To make things more efficient and more cost saving industries have made technology wireless. Wireless technology gives people the chance to get up from their stationary computer, or cord phone and able to freely move without restrictions. The IT, or Information Technology has become a standard and very critical part of today’s society. Wireless technology came from the basic just cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with forever revitalizing technology.
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).
Network management planning and security planning involves identifying the best and most appropriate systems and hardware that the firm can use to better manage network and plan security systems. Therefore, the management required me to examine the best software and hardware systems in the market place that the company can adopt to enable it to manage the network and security. The management required me to advice on the implementation procedure of various plans that are going to be adopted. My responsibility also involved finding out or predicting the impact of the plan on the future operations. They required me to evaluate the challenges the company might face while adopting the changes in the network management plan and security plans.
This paper is going to discuss wireless security from a broad view where I will go into why wireless security is so important, especially today as the ways in which we communicate is changing dramatically. From there I will discuss the multiple wireless security options that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connect to an open wireless network.
The most sparkling stars of wireless networking technology today is IEEE 802.11b.The 802.11b wireless networking has enjoyed a rapid increase in adoption in enterprise settings and in educational and institutional networks. More recently, particularly in the past year as adapter and access point prices have lowered dramatically, 802.11b wireless network products have been making inroads into home and SOHO applications. Initially, the demand for 802.11b in the home was driven by people who ...