logo

Cyber-securityattacks in Wireless Networks Research Paper 2022

   

Added on  2022-09-15

14 Pages3318 Words20 Views
IT 0
Cyber-Security Attacks
in Wireless Networks

IT 1
Table of Contents
Introduction................................................................................................................ 2
Aims and objectives................................................................................................... 2
Aim.......................................................................................................................... 2
Objectives............................................................................................................... 2
Research questions.................................................................................................... 2
Literature summary.................................................................................................... 3
Research methodology............................................................................................... 4
Introduction............................................................................................................. 4
Research approach.................................................................................................. 5
Research design...................................................................................................... 5
Research philosophy............................................................................................... 6
Research setting..................................................................................................... 7
Data collection........................................................................................................ 7
Data sampling......................................................................................................... 8
Data analysis........................................................................................................... 8
Ethical consideration.................................................................................................. 9
Testing and evaluation plan....................................................................................... 9
Project plan.............................................................................................................. 10
References............................................................................................................... 11

IT 2
Introduction
Wireless networks refer to the communication networks that help the
consumers to exchange data from one computer to others using wireless
protocols. The key part of a wireless network is that it increases the
reliability of communication systems where the companies can connect
numerous computing devices and perform data transmission. Safety is a
challenging concern related with the wireless systems where the
corporations are not talented to defend sensitive data from attackers (Wu,
Du, and Fu, 2014). More than 50% of the companies are accessing wireless
communication and also suffer from cyber-crimes and threats (Wei, et al.,
2015). Due to a lack of awareness, employees access malware signals
transferred by the hackers that produce problems in the companies and also
lead the proportion of safety attacks. It is highlighted that numerous kinds
of security attacks occur in the area of wireless networks including DoS
attack, malware, ransomware, phishing, spyware and many more. This
research will help to evaluate such attacks faced by the companies while
adopting wireless networks and also examine the risk factors leading cyber-
attacks.
Aims and objectives
Aim
To examine the cyber-attacks linked with the wireless networks
Objectives
To describe the key aspects of wireless networks
To determine risk factors leading security threats in wireless
networks
To evaluate cyber-attacks occurred in the wireless networks

IT 3
To review the effective mitigation techniques for enhancing the
security of wireless networks
Research questions
What are the key aspects of wireless networks?
Describe different cyber-attacks that occurred in the wireless
networks?
What are the effective mitigation techniques for enhancing the
security of wireless networks?
Literature summary
Sharma and Rawat, (2014) described that wireless systems have the
capability to provide effective services to the organizations by which the
process of data transmission can be done easily. However, safety is the
main anxiety linked with wireless systems by which organizations can face
hacking problems. It is factual that consuming wireless communication,
users can significantly transfer data from one device to another device.
Kumar and Gambhir, (2014) argued that wireless systems are able to
enhance the effectiveness of communication but it is significant to focus on
the security concerns associated with the wireless networks.
The presence of a wireless network can lead to privacy-related concerns as
it contains communication channels that may be retrieved using malware
codes. Waliullah and Gan, (2014) agreed on this argument and tinted that
the attackers use advanced programming codes for reducing confidently in
the wireless systems. So, it is noteworthy to regulate and evaluate the
malware that transpired in the wireless channels. The previous literature
examined that around 56% of the corporations are accessing wireless
services and facing cyber-attacks. Many attackers develop high-level
malicious codes through malware software that may help to find the
accessibility of systems. Wu, Du, and Fu, (2014) determined that different

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Literature Review of Wireless Network
|10
|2373
|81

International Conference on Electrical
|6
|4856
|16

Leading Communication Technology
|5
|2088
|16

Wireless Network Security and Preventive Techniques
|13
|2943
|220

Information Technology Networking 2022
|6
|1887
|13

Wireless Network Security and Preventive Techniques
|12
|3476
|20