Preview

The Concept of Wireless Security

Powerful Essays
Open Document
Open Document
1936 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Concept of Wireless Security
Running head: IT530 ASSIGNMENT UNIT 6

IT530 Assignment-Unit 6
No Name
Kaplan University
Prof: Jeffrey Robinson
03/15/2014

IT530 Assignment-Unit 6
Introduction
Wireless Security
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.

Mythology
The Concept of Wireless Security
There are different types of wireless networks, which connect a system to the internet without wires. There are two standards for wireless which are IEEE 802.11



References: Harris, E., Perlroth, N., Popper, N., & Stout, H. (2014), A Sneaky Path into Target, Customers’ Wallets, The New York Times., retrieved from http://www.nytimes.com/2014/01/18/business/a-sneaky-path-into-target-customers-wallets.html?_r=0 JP (2011), Real-world wireless security, JP Can Fix It, retrieved from http://jpcanfixit.com.au/wireless/ Wang, S. (2010), Different Security Protocols, eHow, retrieved from http://www.ehow.com/list_7160659_different-security-protocols.html TCP/IP Networking Protocol (n.d.), TCP/IP Protocols, retrieved, from http://www.comptechdoc.org/independent/networking How to Improve WiFi Reception (2012), How to Improve WiFi Reception, retrieved from http://freewimaxinfo.com/improve-wifi-reception.html Mitchell, B. (2014), 10 Tips for Wireless Home Network Security, About.com Wireless / Networking, retrieved from http://compnetworking.about.com/od/wirelesssecurity Types of Computer Networks, (2012), - LAN, retrieved from http://freewimaxinfo.com/computer-networks-types.html K.W. Ross, J. K. (2012), Presentation, retrieved from http://content-ist.kaplan.edu/IT530_1308D/topics/it530-06-r-03-reference_powerpoint.html Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm

You May Also Find These Documents Helpful

  • Better Essays

    during this phase. It is our job as forensic investigators to be able to prove the evidence we collected is valid and that the techniques that we use can cause no damage or altering of any of the media devices we gathered. We must prove to the court that the evidence we collected has maintained the integrity of the court by following evidence check in and check out rules, date, time and investigator name and the mathematical techniques that are used to maintain the authentication of the wireless device.…

    • 1923 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Home users tend to have a variety of devices they like to connect wirelessly to the internet and to each other. While at home, users can use a wireless router provided by their ISP or they buy a wireless router that can be connected to the home wired network to provide wireless functionality. Because of the high-price of smartphone hotspots use, few home users use their smartphone network to connect their other devices to the internet. Other ways that home users can connect wirelessly are through ISPs that provide satellite or microwave connections.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Best Essays

    6. W. David Gardner, “Wireless Survey: Many Nets Open To Security Breaches”, Information Week, Mar 10, 2005…

    • 3916 Words
    • 16 Pages
    Best Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    Cited: Ciampa, M. (2012). Security guide to network security fundamentals. (4 ed.). Boston: Course Technology, Cengage Learning.…

    • 2847 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Physical Security

    • 724 Words
    • 3 Pages

    References: Bogue, R (2003,08,11). Lock it down: don 't overlook physical security on your network.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    War Driving

    • 1481 Words
    • 6 Pages

    With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Sms Based Control System

    • 3369 Words
    • 14 Pages

    Home wireless security systems are becoming increasingly popular and it is being a necessary nowadays. There are many benefits to using these compared to conventional systems. There are many products of Wireless Home Security Systems in the market. The price depends on how advance the system is. Normally today home security system is in wireless form rather than wired form.…

    • 3369 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    CEAACK MANET Analysis

    • 1970 Words
    • 8 Pages

    This unstable nature of wireless networks cannot be stated as an excuse for slack security measures .Vulnerable or not the data transmitted must maintain its integrity and the confidentiality of the sender. Authentication and authorization are the two faces of data security which otherwise can be interpreted as the integrity and confidentiality of data. This dual aspect of security is only possible with the inclusion of strong cryptographic techniques that can safeguard the transmitted data with virtually unbreakable cryptographic codes that helps the network to secure itself against…

    • 1970 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    Wired Equivalent Privacy (WEP) is a protocol for encrypting wirelessly transmitted packets on IEEE 802.11 networks. In a WEP protected network, all packets are encrypted using the stream cipher RC4 under a common key, the root key1 Rk. The root key is shared by all radio stations. A successful recovery of this key gives an attacker full access to the network. Although known to be insecure and superseded by Wi-Fi Protected Access (WPA) [18], this protocol is still is in widespread use almost 6 years after practical key recovery attacks were found against it [5,15]. In this paper we present a new key-recovery attack against WEP that outperforms previous methods by at least an order of magnitude. First of all we describe how packets are encrypted: For each packet, a 24-bit initialization vector (IV) IV is chosen. The IV concatenated with the root key yields the per packet key K = IV||Rk. Over the data to be encrypted, an Integrity Check Value (ICV) is calculated as a CRC32 checksum. The key K is then used to encrypt the data followed by the ICV using the RC4 stream cipher.…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    References: [1] W. W. Lu,“Open Wireless Architecture and Its Enhanced Performance”, IEEE Commun. Mag., Vol. 41, No. 6, June 2003, pp. 106–07. [2] A. Shamir,“Identity-Based Cryptosystems and Signature Schemes”, Proc. CRYPTO ’84, LNCS196, Springer-Verlag, 1985, pp. 48–53. [3] G. M. Koien,“An Introduction to Access Security in UMTS,” IEEE Wireless Commun., Vol. 11, No. 1, Feb. 2004, pp. 8–18. [4] J. C. Chen, M. C. Jiang, Y. W. Liu,“Wireless LAN Security and IEEE802.11i,” IEEE Wireless Commun., Vol. 12, No. 1, Feb. 2005, pp.27–36. [5] L. Zhou, Z. J. Haas,“Securing Ad-Hoc Networks,“IEEE Network, Vol. 13, No. 6, Nov./Dec. 1999. [6] P. Papadimitratos, Z. J. Haas,“Secure Routing for Mobile Ad-Hoc Networks”, Proc. SCS Commun. Networks and Distrib. Sys. Modeling and Simulation Conf., Jan. 2002, pp. 27–31. [7] M. G. Zapata,“Secure Ad-Hoc On-Demand Distance Vector Routing”, ACM Mobile Comp. Commun. Rev., Vol. 6, No. 3, July 2002, pp.106-07. [8] A. Juels et al.,“Minimalist Cryptography for Low-Cost RFID Tags”, Proc. 4th Int’l. Conf. Security in Commun. Networks, LNCS 3352, Springer-Verlag, 2004, pp-149-64. [9] Bok Yong Choi, Deok Gyu Lee,“RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing”, SpringerLink, Vol. 344/2006,4, Oct 2006, pp. 1068-1077. Arshi Shamsi received his B.Tech. degree in computer science from Vira College of Engineering,(from U.P.T.U. Lucknow) Bijnor, India, in 2004 and pursuing M.Tech. degree in Computer Science from Al-Falah School of Engineering and Technology,(Maharishi Dayanand University, Rohtak) Haryana. He is working as Assistant Professor, with Department of Computer Science, at IIMT Engineering College. He is having a total work experience of 7 years. Shahroukh Khan received his B.Tech. degree in computer science & Engg from Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, India, in 2007 and pursuing M.Tech(CSE) Degree in Computer Science from Al-Falah School of Engineering & Technology (M. D. University, Rohtak, Haryana). He is working as Lecturer,…

    • 3434 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Abstract — Wireless local area network (WLAN) has been widely used in many sectors. The popularity gained is due to many reasons, such as ease of installation, installation flexibility, mobility, reduced cost-of-ownership, and scalability. However, regardless of the benefits mentioned above, WLAN have some security threats, in which anyone who use it or intend to use it should be aware of.…

    • 5329 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    voting

    • 7263 Words
    • 30 Pages

    Abstract — Voting process in today’s era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a…

    • 7263 Words
    • 30 Pages
    Good Essays
  • Powerful Essays

    Zigbee

    • 989 Words
    • 4 Pages

    Contact Us • INTRODUCTION TO WIRELESS NETWORKS • COMPUTER NETWORKS AND NETWORK TYPES • COMPUTER NETWORKS TOPOLOGIES • Zigbee Technology • Zigbee Networks • Zigbee Architecture • How to make computer network • Local Area Network - LAN • Metropolitan Area Network (MAN) • Storage Area Network (SAN) • Desk Area Network (DAN) • Personal Area Network (PAN) • Campus Area Network (CAN) • Virtual Private Network (VPN) • How Wireless Network Works • Disadvantages of Wireless Networks • Wireless Networks Limitations • Computer Network Security • WIDE AREA NETWORK (WAN) • Trends & Developments in WAN Technology • WIRED NETWORKS CONNECTIONS • WHAT IS…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Wifi Technology

    • 1609 Words
    • 7 Pages

    Wi-Fi allows to connect to the internet from virtually anywhere at speeds of up to 54Mbps.The computers and handsets enabled with this technology use radio technologies based on the IEEE 802.11 standard to send and receive data anywhere within the range of a base station.…

    • 1609 Words
    • 7 Pages
    Powerful Essays