logo

Threats to Wireless Networks and Countermeasures

11 Pages2339 Words60 Views
   

Added on  2020-03-23

Threats to Wireless Networks and Countermeasures

   Added on 2020-03-23

ShareRelated Documents
Running head: THREATS TO WIRELESS NETWORKS AND COUNTERMEASURESThreats to Wireless Networks and CountermeasuresName of the student:Name of the university:Author Note
Threats to Wireless Networks and Countermeasures_1
1 THREATS TO WIRELESS NETWORKS AND COUNTERMEASURESTable of ContentsIntroduction:....................................................................................................................................2Wireless Network Attacks...............................................................................................................3Accidental Association................................................................................................................3Malicious Association.................................................................................................................3Non-traditional Network..............................................................................................................3Denial of Service.........................................................................................................................3Network Injection........................................................................................................................3MAC Spoofing (Identity Theft)...................................................................................................3Countermeasures to the Raised Issues.............................................................................................3Securing Wireless Access Points.................................................................................................3Securing Wireless Client Devices...............................................................................................3Securing Wireless Networks........................................................................................................3Training and Educating Users.....................................................................................................3Network Auditing........................................................................................................................3Conclusion:......................................................................................................................................3References:......................................................................................................................................3
Threats to Wireless Networks and Countermeasures_2
2 THREATS TO WIRELESS NETWORKS AND COUNTERMEASURESIntroductionWireless networking can be beneficial in increasing the productivity of any organizationor easy connectivity between the devices. Because it is much easy to setup within the premisesand at low cost expenditure it is being listed into the trending technology. This provides manyadvantages but also results in certain threats and issues that can alter the existing information andcould raise security and privacy of the individuals connected to the network. These threats havebeen described in the following report include the countermeasures that could be helpful inmitigating them at extent level. The purpose of this report is to provide a basic understanding onthe wireless networking concept and threats related to the application of this technologyincluding the countermeasures. Wireless Network AttacksAccidental AssociationAccidental association could lead to the unauthorized access to an organization or anindividual network, which occurs due to the overlapping network of neighbor’s wireless accesspoint. When an individual turns on his or her computer and accidently it latches to the wirelessaccess point from the overlapping network of the neighbor and this accident is untraced by theuser that it has occurred (Kavianpour & Anderson, 2017). However this is a term of securitybreach to the neighbor network in that proprietary information of the individual or theorganization is being exposed and could create a link to the computers connected to that network.
Threats to Wireless Networks and Countermeasures_3
3 THREATS TO WIRELESS NETWORKS AND COUNTERMEASURESMalicious AssociationIt can be referred to the moment when wireless devices are actively made by the intruderin manner to be connected to that organization ions network through their personal laptop orother computer rather being connected to the company AP (Access Point).these computers orlaptops are defined as soft Aps that are created when certain coding has been used to make theintruder’s network card look alike the legitimate access point (Pathan, 2016). Various maliciousactivities can be done after gaining the access such as intruder can steal the password, plantTrojans and/or launch attack on wired network.Non-traditional NetworkIt can be regarded as the security risk as non-traditional networks like Bluetooth devicesare not the safe devices for cracking. Barcode readers, wireless printers, copiers, and handledPDAs are vulnerable to such attacks and should be secured as these can be overlooked by any ITteam or individual those have not focused on access points and on computers much broadly(Hoque et al., 2014). Denial of ServiceIt can be represented as DOS that can be occurred when an intruder tries to continuously bombardan AP that has been targeted or networks that have premature successful connection messages, bogusreports, or other commands including failure messages (Yan et al., 2016). These attempts could lead incrashing the network and even the legitimate user is not able to get on the network. Such attacks arecompletely relied on the abuse of protocols for example EAP (Extensive Authentication Protocol).Network InjectionSuch type of attack occurred when an intruder uses the ‘non-filtered network traffic’access points, mainly the broadcasting network traffic for example OSPF, HSRP, RIP, and the
Threats to Wireless Networks and Countermeasures_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: Elements, Issues, and Frameworks
|15
|5037
|1

Network Security in Wireless Communication Network
|2
|1834
|428

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

IoT Applications and Services - PDF
|8
|2649
|134

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Wireless Network Technology and Preventive Techniques
|12
|2757
|322