Preview

War Driving

Powerful Essays
Open Document
Open Document
1481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
War Driving
War Driving With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections. Wireless internet connections began in the 1970’s with the creation a wireless network in Hawaii called the ALOHANET, which connected seven computers on four separate islands (Goldsmith). Comparing this system to the ones we use today would show many advances in technology since the creation of the ALOHANET. Though this is the first recorded wireless network put in use, the idea of the World Wide Web began twenty years earlier with a group of scientists in the United States who saw a need for such a network (Goldsmith). With the invention of wireless transmission came the dangers of information being corrupted and/or intercepted by people who did not have permission to access such information and the battle to prevent such actions began. Today one of the dangers faced by anyone using a wireless connection without the correct security protocols is the act of war driving. War driving has a connection to war dialing which was seen in the 1980s movie, War Games. War dialing is a process of dialing all the telephone numbers in a certain area searching for those containing computer connections via a modem. As a research project, Peter Shipley showed the vulnerabilities in unprotected modems by war dialing phone numbers in the Bay Area of San Francisco in the late nineties (Poulsen). This war dialing experiment led to his discovery of many unprotected modems belonging to banks, hotels,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    What is war driving? War driving is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. To do war driving, you need a car, a laptop, a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Frankk, D. (2012, May 25). Important Security Issues in Wireless Networks. Retrieved from Examiner.com: http://www.examiner.com/article/security-issues-wireless-networks…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    During the past decade the technological advancements of the Internet has significantly changed the method of communications and access to information for millions of users worldwide. First developed as a secure communications mode for the military during the height of the cold war era, the Internet has become as commonplace for Americans as the telephone or automobile. Users, provided that they have the necessary computer hardware and browser application as well as a network connection to the Internet are able to access and exchange information at speeds measured in thousandths of a second. Each time a connection to the Internet is made, users risk compromising their privacy through many different channels, including Internet service providers,…

    • 3351 Words
    • 14 Pages
    Best Essays
  • Good Essays

    The End Of Privacy

    • 1056 Words
    • 5 Pages

    A user could speak with a person miles away just as if they were right beside one another. Because of this convenience, telephones began to be mass produced and within ten years 150,000 people owned telephones. Users enjoyed the convenience and privacy of this method of communication and being able to talk to people within their own homes. However, just like eavesdropping in real life, the first real invasion of privacy began with wiretapping. Wiretapping allowed users to tap into phone lines and listen in on conversations. This information could be sold by a private investigator to another citizen or could be sold to a company for corporate espionage (Kaplan, 2012). The idea of selling information gained from these new sources of technology followed into the largest form of peer to peer communication today, the internet. The internet was initially created in order to send data between two computers without the need to transport individual drives. Just like with the telephone, this information could be intercepted and sold to provide information. As time went on, more computers became connected and began to form a web of connections. Tim Berners-Lee had the idea to use this web to link all the information stored on computers. Thus, the internet was formed, and new opportunities for sharing information become possible. The first…

    • 1056 Words
    • 5 Pages
    Good Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Internet Security

    • 1945 Words
    • 8 Pages

    also make it an ideal way for someone to keep a careful watch on the user…

    • 1945 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Local Network Area

    • 15891 Words
    • 64 Pages

    L ocal area n e t w ork (L AN) communicat io ns s ecurity is address ed…

    • 15891 Words
    • 64 Pages
    Satisfactory Essays
  • Best Essays

    The Internet has revolutionized the computer and communications world like nothing before. The invention of the telegraph, telephone, radio, and computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard to geographic location.…

    • 4657 Words
    • 19 Pages
    Best Essays