Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security risk associated with mobile devices
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security risk associated with mobile devices
Introduction
When wireless networks were first introduced, there were relatively few dangers, as hackers had not yet had time to latch onto the technology, as it was not very common. When they made it no one had any idea wireless networking would stretch so far and to so many people and so it was not create with a built in security. Then wireless technology became more popular because it allowed for mobility and so as the technology spread so did the ability to hack into them. It became much easier to hack into wireless networks over wired networks. This is where wireless network security comes into play. It is the prevention of unauthorized access of damage to computer using wireless networks. There are three main forms of wireless networking security: MAC Address Filtering, Wireless Authentication and Data Encryption. In addition there are also several smaller things that can be done like RF shielding. Each vary in who they protect and the level of protection they offer
MAC Address Filtering
The first method is Mac Address filtering which most wireless access points (WAP) support. This is a process that allows you to limit the access to your network by using the physical address or wireless NIC’s. In other word the MAC address filtering creates a list of accepted users to limit access to the network. A table is stored in the WAP contains the MAC addresses that are allowed to connect to the wireless network. Any frames that do not contain one of the MAC addresses listed in the table are rejected. In addition, many WAP’s allow you to pick specific MAC addresses and deny them access. This is rather useful in a small close quarter, for example an office building, where the network signal goes beyond the perimeter. You can check y...
... middle of paper ...
...ith a user entered PIN. Then using this, a powerful algorithm is created, that will very frequently generate a new encryption code. Any of these three provide a very strong form of security however they are expensive. Meanwhile, another extra step that can add to your security is using a RF shield. This is just applying a specialized wall paint and window film to a room or building. This significantly weakens wireless signals, thus keeping the signal from broadcasting outside of the specified area. This increases security because it makes it very difficult for hackers to receive the signals from beyond the controlled areas.
Conclusion
Although all these methods provide some level of security there are ways to bypass them. As technology grows, the ability to bypass the technology also grows. The method of security will have to continue to be improved and enhanced.
Segmenting the wireless network from the wired network though, is not only a trust issue, wireless networks suffer from many attacks such as Denial of Service caused by interference. The access point that will provide wireless access will be connected to a wired switch, however the separation of the wireless network is proposed to be done with the use of virtual LANs. VLANs will separate the network to two logical networks operating on the same physical network. This separation will enchant network’s security as the main network will be inaccessible from customers as well as it will not be affected if the wireless network is facing issues. The AP must be using Wi-Fi Protected Access 2 (WPA2) security protocol that has advanced encryption standards comparing to
To secure the network setup, WPA2 can be used along with the optional Pre-Shared Key (PSK) for authentication. To encrypt the network with WPA2-PSK, the router is configured not with an encryption key but rather plain paraphrase. TKIP(for Temporal Key Integrity Protocol) is used along with the network SSID for generating unique encryption key for the wireless clients.
The deployed wireless network automatically disables rogue access points when required. In order to connect to the wireless network, all wireless laptops are required to be the current domain members. A group policy is enforced to all domain members so as to lock their system to SSID access point. For network layer protection, firewalls must be installed throughout the network. Wireless connections should always be WPA2 secured. All systems must have anti-virus software which provides protection from viruses. To ensure that only valid users access the network system, server certificates are installed in the
Electronic progress has been miraculous, even exciting, but with it problems evolve. One of the greatest is the threat to people's personal privacy. The Automatic Teller Machine (ATM) was developed in the 1980's to give people an easier way to de posit and withdraw cash that they had in the bank. Everyone who has an account is assigned a secret PIN number, but someone in the bank has access to clients' financial records in the electronic database. Another type of new technology is the ele ctronic tolls used on the nation's highways. Drivers can pay tolls...
despair because of our smart phones, TV’s and computers. Any of these devices can be hacked
There is constant concern about different kinds of devices and tools because of their vulnerability: laptops; personal computers in the home; libraries and public workstations; USB Flash Drives and email, to name a few. These items are easily accessible for those attempting to breach security.... ... middle of paper ... ...
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).
Security for the network will be provided by a network based packet filtering firewall, proxy server and a Wi-Fi Protected Access 2 (WPA2) passphrase. I would also suggest not broadcasting the Service Set Identifier (SSID) and to set up the router to filter the Media Access Control (MAC) addresses so that devices that have their MAC addresses registered will be allowed access to the wireless network (Dean, 2013, p. 357). I would restrict access to the proxy, file and print servers by locking them in a secure climate controlled closet. Access would be controlled by a key card that would be held by the network administrator.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.
I will be searching about the Security Risks of Mobile Phones, Expanding on them, how they affect us and what we can do to prevent them. “About 75 percent of the world has Mobile Phones”. I will be searching how it affects their everyday life. I will also talk about different Mobile Phones and what kind of risks they contain. It is a Vast and broad topic which requires a lot of Research. I will be searching different sites to make sure that I have
For thousands of years, cryptography and encryption have been used to secure communication. Military communication has been the leader in the use of cryptography and the advancements. From the start of the internet, there has been a greater need for the use of cryptography. The computer had been invented in the late 1960s but there was not a widespread market for the use of computers really until the late 1980s, where the World Wide Web was invented in 1989. This new method of communication has called for a large need for information security.
Wireless technology has come from the basics of cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with technology forever revitalizing. Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing wireless Internet at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly via a router.
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
The invention of wireless technology was to improve modern life in many ways; however, the lack of limiting one’s use will make life harder.