Preview

Wireless Network Security – How Secure Is It?

Powerful Essays
Open Document
Open Document
6120 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Network Security – How Secure Is It?
WIRELESS NETWORK SECURITY – HOW SECURE IS IT?

by

Chris Bradley

ITT Technical Institute Information Systems Security student

November 23, 2010

Dr. French:

This report on “Wireless Network Security” is submitted in accordance with your assignment for November 23, 2010.

Sincerely,

Chris Bradley

ABSTRACT
For this project, I asked the question “is wireless network protection truly safe?” My literature search led me to conclude that, if consumers use the most up-to-date and secure wireless network protection, they can connect to their wireless network and conduct business safely and confidently.

TABLE OF CONTENTS
Title Page ----------------------------------------------- i
Letter of Transmittal ------------------------------------ ii
Abstract ------------------------------------------------- iii
Table of Contents ---------------------------------------- iv
Statement of the Problem --------------------------------- 1
Methods -------------------------------------------------- 1
Results -------------------------------------------------- 2
Conclusions ---------------------------------------------- 2
Acknowledgements ----------------------------------------- 3
References ----------------------------------------------- 5
Appendix A ----------------------------------------------- 6
Appendix B ----------------------------------------------- 9

STATEMENT OF THE PROBLEM
Is wireless network protection truly safe? Can the average consumer feel comfortable trusting it? Technology is advancing at an alarming rate. Consumers are always looking for the most convenient ways to connect to their network and the Internet, and wireless networks are becoming more and more accepted and practical. Sensitive information, such as username/password combinations, Social Security numbers, bank accounts, etc, in the wrong hands could cause a consumer costly problems. While not 100% secure, using the most secure



References: Vakil, F. (2005). Wireless networks and security issues. Retrieved September 21, 2010, from American Library Association. (2005). Wireless network configuration and security strategies September 21, 2010, from http://web.ebscohost.com.proxy.itt-tech.edu/ehost/detail?vid=1&hid=111&sid=d467e3be-c81c-4a03-97e3-03ef864b3725%40sessionmgr111&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=f5h&AN=18501151. WPA Wireless Security for Home Networks. Retrieved on September 21, 2010, from http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx. Wired Equivalent Privacy. Retrieved on September 21, 2010, from http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy. (In)Security of the WEP algorithm. Retrieved on September 21, 2010, from http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html. 10 Tips for wireless home network security Securing your wireless network. Retrieved on September 21, 2010, from http://www.practicallynetworked.com/support/wireles s_secure.htm.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hit-150-Wk4D1

    • 539 Words
    • 3 Pages

    (1) security features or software that protect information when a wireless network is used. (2) non-redisclosure policies. (3) storage and retention policies.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When running any type of network you need to have security in place to keep threats out. I would like to start with the WLAN by using a WPA2 which will encrypt the network with a 256 bit key that would be required to log into the network. Risk of running a WLAN is higher because of the threats of hackers that may try to crack the system. This is why using a WPA2 is better because of the long key lengths to improve security. Employees of Kudler fine Foods should not be given the…

    • 502 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Wireless is used in everything that we do with smartphones from personal to work related actions. Searching the internet, sending a email or sending a text message.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    If you are unable to learn the router settings as different models in the market have different settings then you should install the apps on your desktop to learn about the network that are free for use.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    After the site survey is done and the security measures are determined and implemented a business should feel confident in their WLAN. This being said, there is no such thing as a perfect security system and you should always be diligent and frequently check your system to make sure the security protocols set in place are still working for your business.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    An alternative to the out of date WEP could have easily been used. The Wi-Fi Protected Access (WPA) standard in conjunction with a sophisticated encryption system could have been used to replace the WEP. Firewalls could have reduced or eliminated the ability of the hackers to gain access to sensitive information. Lastly the company should have ensured that all computers containing customer information were secure when connecting to a wireless network.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bis 220 Week 3 Questions

    • 648 Words
    • 3 Pages

    How has wireless media affected telecommunications? What are some of the challenges to developing a system of communications based on wireless media? Since wireless media emerged, telecommunications became charged with the use of fiber optics, electronics, and the Internet. With the advancement of wireless media telecommunications we now have the ability to send messages to one another. A major challenge to developing a system of communications based on wireless media is the security. Increasingly, companies and individuals are using wireless technology for important communications they want to keep private, such as mobile e-commerce transactions, email, and corporate data transmissions. As these wireless technologies grow, and store valuable information, hackers start stepping up their attacks on these new technologies. It is challenging to implement security in small-footprint devices with low processing power and small memory capacities and that use unreliable, low-bandwidth wireless networks.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    entities, materials, or equipment are necessarily the best available for the ..... WLAN Security Best Practices .......................................................................................8-1 ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Telecommunications HW

    • 486 Words
    • 2 Pages

    WPA is no longer viewed as a safe solution because in 2009 a partial crack appeared. This means the standard was not as safe as it was before.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    3) Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.…

    • 6120 Words
    • 25 Pages
    Good Essays
  • Powerful Essays

    Advance Security Measures

    • 2708 Words
    • 11 Pages

    This paper not only furnishes the details about Wireless LANs but also bestows an abundant number of methods in which the security of these WLANs can be breached. It also contributes a myriad number of ways in which one can thwart the potential assault on the WLANs network.…

    • 2708 Words
    • 11 Pages
    Powerful Essays