logo

BN303 Wireless Networks and Security Assignment

   

Added on  2020-05-16

7 Pages1674 Words128 Views
Mobile & Wi-Fi HotspotTechnology & Security

Mobile & Wi-Fi Hotspot Technology & Security Table of ContentsTitle.......................................................................................................................................................2Introduction...........................................................................................................................................2Background Details...........................................................................................................................2Need for Research.............................................................................................................................2Motivation for Research....................................................................................................................2Significance of Research in Problem Solving....................................................................................3Researcher’s Perspective...................................................................................................................3Aim/Objective of the Research..........................................................................................................3Materials & Methods.............................................................................................................................4Research Methodology – Qualitative & Quantitative Research.........................................................4Data Collection Methods...................................................................................................................4Expected Outcome.................................................................................................................................5Timeline................................................................................................................................................5References.............................................................................................................................................71

Mobile & Wi-Fi Hotspot Technology & Security TitleMobile & Wi-Fi Hotspot Technology & SecurityIntroductionBackground DetailsA hotspot is a physical location where the users may obtain internet access with the aid of theWi-F I technology. The connection is made using Wireless Local Area Network (WLAN)through the router connected with Internet Service Provider. There are a number of security issues that are being witnessed in the area of mobile and Wi-Fi hotspot technology. Also, the usual security controls and parameters, such as encryption inthese connections are not strong. There are also unsecure steps and practices adopted by theusers that result in the compromise of security [1]. Need for ResearchThe common encryption methods, such as WEP and WPA that are used for the protection ofthe private networks are not applicable in the cases of mobile and Wi-Fi hotspots. There is alot of complexity associated with the supporting users that result in the difficulty to ensurethe security of the networks [2]. The research is necessary to understand the common mobile and Wi-Fi hotspot securityissues and understand the practices that may be adopted to control and avoid the same. Motivation for ResearchThe increased use of mobile and Wi-Fi hotspots puts the risk of people capturing real-timedata and information from the network traffic. The unsecure hotspots allow the users to easilycapture the sensitive data and information with much ease. These issues have led to thecompromise of the security and privacy of the data and information [3]. The increased frequency of such risks and attacks provided the motivation to research uponthe common issues and causes behind these attacks, the prevention mechanism that shall beadopted to control these attacks, and the best practices that shall be utilized to avoid theseattacks. 2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Manipulation of the Handshake Protocol
|3
|1367
|380

Paper on Wireless Networking Concepts
|15
|1083
|28

Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258

Mobile Devices and Network Security
|7
|1893
|181

Application of VPN to JKS Accountant
|13
|1078
|392

Benefits of VPN Implementation for JKS Accounting Information System
|13
|864
|310