Wireless Security and Privacy Protocols Part 1

1921 Words4 Pages

This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important, especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions of the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
Wireless is everywhere today, whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connected to wireless from the moment they leave their home till they get to work and then back. Wireless communication definitely provides an advantage over wired networks due to its mobility allowing users to connect from virtually anywhere, however because of this convenience they are also more physically exposed compared to wired networks because of how the data is transmitted given attackers a high number of access points to constantly attack. This also brings around the concern because of a large number of wireless networks constantly being put up most everyone is not going to recognize the importance of securing your network and how easily their data can and probably is being stolen. Think about living in an apartment complex or in a neighborhood and doi...

... middle of paper ...

...Online. Retrieved on 29 Apr 2014 from http://www.csoonline.com/article/2122635/mobile-security/wireless-security--the-basics.html

CSO Staff (Apr 1, 2005). 5 Essentials to Wireless Security. CSO Online. Retrieved on 29 Apr 2014 from http://www.csoonline.com/article/2118534/mobile-security/5-essentials-to-wireless-security.html

Kathryn Tewson and Steve Riley (2008) Security Watch: A Guide to Wireless Security. TechNet Magazine. Retrieved on 29 Apr 2014 from http://technet.microsoft.com/en-us/magazine/2005.11.securitywatch.aspx

Brandon Widder (January 15, 2013). How to Secure a Wireless Network. Digital Trends. Retrieved on 29 Apr 2014 from http://www.digitaltrends.com/computing/how-to-secure-a-wireless-network/

Thomas M. Thomas. (Jul 16, 2004) Wireless Security. Cisco Press. Retrieved on 13 May 2014. http://www.ciscopress.com/articles/article.asp?p=177383&seqNum=5

More about Wireless Security and Privacy Protocols Part 1

Open Document