logo

Wireless Network Technology and Preventive Techniques

   

Added on  2023-06-14

12 Pages2757 Words322 Views
Running Head: INFORMATION SECURITY 1
Wireless Network Technology and Preventive Techniques

INFORMATION SECURITY 2
Table of Contents
Introduction......................................................................................................................................3
Overview of Technology.................................................................................................................3
Relevant Technologies and Its Applications...................................................................................4
Challenges of Wireless Network Security.......................................................................................6
Identification of Gaps in the Literature...........................................................................................7
Critical Issues of Security................................................................................................................8
Future Research Directions..............................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10

INFORMATION SECURITY 3
Introduction
In this era of new technologies, both wired and wireless technologies are used in different
devices according to the users’ requirements. Although wireless technology is modern and
considered more reliable than wired technology but wireless technique has introduced some
security threats that were not heard before. Bluetooth and Wi-Fi are wide-spread examples of
wireless technology. These are quicker and easier to access than wired devices. A mobile
network enables devices to stay connect to the network without any wired which is really
smooth. Wireless technology offers benefits of portability and flexibility to its users in their
communication. Moreover, it also increases productivity of the devices within lower installation
costs. With these benefits of wireless technology, it also causes some issues of security of
information for users of mobile devices. The purpose of this research report is to embark on
security issues of wireless technologies and its prevention methods. Without using some
significant prevention methods it is not possible to get rid of this problem of violation of privacy
and security of data.
Overview of Technology
The security of the wireless networks is violated in different ways by cyber criminals. The most
common security threats of the wireless technology are unauthorized access of the information
by using malicious entities, poor use of cryptography, denial of service attack, an improper
synchronization of data and other harmful virus attacks. To perform security violation activities,
hackers use different methods such as virus attacks, DDoS attacks and network intrusion attack
and phishing and identity theft. All these methods are so much vulnerable and can damage whole
database. In virus attack, harmful viruses such as ransomware etc. are injected into the wireless
network (SearchMobileComputing, 2018). A single infected node or computer in a network can

INFORMATION SECURITY 4
spread virus into the all other nodes of that particular network and can corrupt the information
which is stored in the form of files and folders (Karygiannis & Owens, 2002). An important way
which is used to insert virus into the network is a programming script and when this script
executes then it slows down the network, restricts the access of information of the connected
nodes to the wireless network and halts the functions that are performed by the users. On other
side, DDoS attack is the distributed denial of service attack and it is implementing by the hackers
to take the control over the main network and stops the other connected nodes to access
information from that network. Moreover, phishing attack or identity theft is the main security
threat of the wireless technology. Through this attack, hackers try to obtain the personal
information of users in an unauthorized way who are connected with wireless network. Later on,
this information is used to screw that person. Therefore, in this way, wireless network security is
violated by the hackers considerably. At this stage, it is necessary to resolve this problem by
taking some quick actions. The next segment of this report focuses on the prevention
technologies of wireless network security.
Relevant Technologies and Its Applications
At the developers’ end of the wireless technology, various new and relevant methods are found
to overcome the security issues of this technology. These methods intervene an appropriate use
of the encryption technique, use of anti-virus, network monitoring techniques and use of firewall.
Encryption technique is helpful to hide the sensitive data and network addresses from the cyber
criminals. Actually, this technique changes the data into an unknown format which is difficult to
identify by the hackers. Additionally, for wireless network security some key standards can be
also be used such as EAP, EAS and PKMv2. Here EAP is used for authentication of the network
device and user (Dedo, 2004). It is considered as Internet Engineering Task Force and EAP

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security threats in cloud computing and preventive methods
|9
|2288
|116

Preventative Approaches to Hacking Information Technology
|14
|2907
|48

Wireless Network Security and Preventive Techniques
|12
|3476
|20

Threats to Wireless Networks and Countermeasures
|11
|2339
|60

Introduction to Cyber Security
|14
|3209
|388

Assignment on Risks and Risk Management
|11
|781
|13