A Report on Wireless Network Security and Preventive Techniques Used
VerifiedAdded on 2023/06/13
|11
|2804
|321
Report
AI Summary
This report provides an overview of wireless network security and existing preventive techniques. It highlights the increasing importance of securing wireless networks due to the rise in security threats and vulnerabilities. The report discusses various technologies involved, such as Wireless Local Area Networks (WLAN), 3G networks, Wi-Fi Protected Access (WPA), and Virtual Private Networks (VPN). It identifies challenges like DDoS attacks, rogue access points, jamming, evil twin attacks, and packet sniffing. Furthermore, it details preventive techniques including encryption, MAC address filtering, router security measures, strong password practices, and steganography. The report also acknowledges existing literature gaps and addresses issues such as the overview of technologies involved in wireless networks. This document is available on Desklib, where students can find additional resources and solved assignments.

Running head: INFORMATION SECURITY 1
WIRELESS NETWORK SECURITY AND PREVENTIVE TECHNIQUES
Name:
Institution Affiliation:
WIRELESS NETWORK SECURITY AND PREVENTIVE TECHNIQUES
Name:
Institution Affiliation:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INFORMATION SECURITY 2
Abstract
The interest on the security on any sort of network is essential. The reduction of attacks and wish
to have the authentication continues to be the main concentrate of various network
administrators. Nonetheless, the issues that existed earlier existed are added any time you
incorporate wireless network to the equation. As the wireless network becomes widely used,
flawed security of numerous of those networks actually is noticeable. There are various
organizations which have proposed techniques to secure the wireless networks from the invaders.
Nevertheless, there have been virtually no present wireless security execution which everyone
might constantly approve is ideal, regardless on the network it is employed on. A few
implementations are satisfactory for specific settings, and there has been effort underway in
creating foreseeable future solutions. For the meantime, a number of the wireless end users
render the scenario to become more difficult when they advertise the current susceptible
networks. In this research investigation it is going to take a look at the wireless network security
and existing preventive techniques which are presently used. This research study will give an
insight to the organization and the end users so that they are aware of the present wireless
security and the techniques they can employ to curb the invaders who might attack their systems.
Abstract
The interest on the security on any sort of network is essential. The reduction of attacks and wish
to have the authentication continues to be the main concentrate of various network
administrators. Nonetheless, the issues that existed earlier existed are added any time you
incorporate wireless network to the equation. As the wireless network becomes widely used,
flawed security of numerous of those networks actually is noticeable. There are various
organizations which have proposed techniques to secure the wireless networks from the invaders.
Nevertheless, there have been virtually no present wireless security execution which everyone
might constantly approve is ideal, regardless on the network it is employed on. A few
implementations are satisfactory for specific settings, and there has been effort underway in
creating foreseeable future solutions. For the meantime, a number of the wireless end users
render the scenario to become more difficult when they advertise the current susceptible
networks. In this research investigation it is going to take a look at the wireless network security
and existing preventive techniques which are presently used. This research study will give an
insight to the organization and the end users so that they are aware of the present wireless
security and the techniques they can employ to curb the invaders who might attack their systems.

INFORMATION SECURITY 3
Introduction
The wireless networks are among the major problems in the computing and information
technology that are susceptible to several security threats as well as attacks (Liang & Yu, 2015).
The areas of the wireless network usually involves the transfer of the information hence needs
security in order to ensure that organization information has not been breached. Wireless
networks could be secured via different means which are discussed in this report.
Overview of the technology involved
The wireless technology in their simplest perception allows one or perhaps more devices to
connect without the physical connections and would not require the network or perhaps the
peripheral cabling (Liang & Yu, 2015). The wireless technologies utilize the radio frequency
transmission as their means for the transferring of the data, whilst the wired technologies utilize
the cables. The wireless technology for the majority of the cases ranges from the intricate
systems for example the Wireless Local Area Networks (WLAN), the cell phones to the simple
devices for instance the wireless headphones, microphones and other devices in particular the
remote controls, or perhaps the store information. Additionally, they might also consist of the
isolated controls, some cordless computer keyboards and mice and wireless hi-fi stereo
headphones.
Relevant technologies and applications of those technologies
In undertaking research on the wireless security and preventive methods, the scope of the area
network technology were used (Stallings, 2016). The numerous tools were employed locally in
the coverage. These types of tools include the switches, computers and network. Other tools that
are employed for the communication within the local network were also considered (Liang &
Yu, 2015). Without any doubt, the wireless technology has been relevant and a vital component
Introduction
The wireless networks are among the major problems in the computing and information
technology that are susceptible to several security threats as well as attacks (Liang & Yu, 2015).
The areas of the wireless network usually involves the transfer of the information hence needs
security in order to ensure that organization information has not been breached. Wireless
networks could be secured via different means which are discussed in this report.
Overview of the technology involved
The wireless technology in their simplest perception allows one or perhaps more devices to
connect without the physical connections and would not require the network or perhaps the
peripheral cabling (Liang & Yu, 2015). The wireless technologies utilize the radio frequency
transmission as their means for the transferring of the data, whilst the wired technologies utilize
the cables. The wireless technology for the majority of the cases ranges from the intricate
systems for example the Wireless Local Area Networks (WLAN), the cell phones to the simple
devices for instance the wireless headphones, microphones and other devices in particular the
remote controls, or perhaps the store information. Additionally, they might also consist of the
isolated controls, some cordless computer keyboards and mice and wireless hi-fi stereo
headphones.
Relevant technologies and applications of those technologies
In undertaking research on the wireless security and preventive methods, the scope of the area
network technology were used (Stallings, 2016). The numerous tools were employed locally in
the coverage. These types of tools include the switches, computers and network. Other tools that
are employed for the communication within the local network were also considered (Liang &
Yu, 2015). Without any doubt, the wireless technology has been relevant and a vital component

INFORMATION SECURITY 4
when it comes to the computer and the telecommunication world along with the Wireless third
generation network which offers an increase in the benefits to various networks. The WLAN
and the wireless technologies are the ones which have been identified to have great potential to
the value of the custome r(Pierson & DeHaan, 2015). 3G is regarded as the standard which
defines the technology which could provide the bandwidth wireless access over the large area as
well as support to different services for example the WLAN, and roaming which is the disruptive
technology which offers a much higher bandwidth within the smallest areas.
The wireless security technologies are Wi-Fi Protected Access, WiFi-Protected Access 2 and
Virtual private networking (Pierson & DeHaan, 2015). The WPA and WPA 2 are essentially the
based security certification from the Wi-Fi alliance for an organization, SMB as well as the small
office Wireless LANs which offers a mutual authentication to verify on the personal users as
well as the advanced encryption (Pierson & DeHaan, 2015). WPA usually offers an organization
class encryption as well as WPA 2. It has been recommended that the WPA or the WPA 2 be
utilized for the enterprise as well as the SMB wireless LAN deployments (Pierson & DeHaan ,
2015 ) . WPA and WPA2 provide protected access control, a powerful data encryption and also
simultaneously protecting of the network from any specific the active attacks. On the VPN
provides an effective security to the customers’ wirelessly accessing network during the road and
off from the office (Pierson & DeHaan, 2015). Utilizing the VPN the customers might make a
secure tunnel between 2 or more points on the networks using encryption, although the encrypted
data has been transmitted over the unsecured networks for instance the public internet.
Highlighting the challenges/problems in your chosen research area
when it comes to the computer and the telecommunication world along with the Wireless third
generation network which offers an increase in the benefits to various networks. The WLAN
and the wireless technologies are the ones which have been identified to have great potential to
the value of the custome r(Pierson & DeHaan, 2015). 3G is regarded as the standard which
defines the technology which could provide the bandwidth wireless access over the large area as
well as support to different services for example the WLAN, and roaming which is the disruptive
technology which offers a much higher bandwidth within the smallest areas.
The wireless security technologies are Wi-Fi Protected Access, WiFi-Protected Access 2 and
Virtual private networking (Pierson & DeHaan, 2015). The WPA and WPA 2 are essentially the
based security certification from the Wi-Fi alliance for an organization, SMB as well as the small
office Wireless LANs which offers a mutual authentication to verify on the personal users as
well as the advanced encryption (Pierson & DeHaan, 2015). WPA usually offers an organization
class encryption as well as WPA 2. It has been recommended that the WPA or the WPA 2 be
utilized for the enterprise as well as the SMB wireless LAN deployments (Pierson & DeHaan ,
2015 ) . WPA and WPA2 provide protected access control, a powerful data encryption and also
simultaneously protecting of the network from any specific the active attacks. On the VPN
provides an effective security to the customers’ wirelessly accessing network during the road and
off from the office (Pierson & DeHaan, 2015). Utilizing the VPN the customers might make a
secure tunnel between 2 or more points on the networks using encryption, although the encrypted
data has been transmitted over the unsecured networks for instance the public internet.
Highlighting the challenges/problems in your chosen research area
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INFORMATION SECURITY 5
There are different security issues which have affected the wireless networks over the last few
years Stallings, 2016). It is known that an individual without comprehension of the networks can
easily establish a flawed and vulnerable network. For that reason, it is very important remember
that even their system administrators might lack understanding to the wireless network
implementations (Stallings, 2016). Currently there are various security challenges which affect
the wireless networks these are highlighted as follows;
DDoS attack
In the DDoS attacks, a hacker set up an application on the machine which afterwards along with
the other wireless networking systems might be called to take part in the attack (Stallings, 2016).
Considering that the DDoS attacks normally provide heavier volume of the messages they have
got the prospective to be much disruptive compared to simple DoS attacks that could derive from
one particular computer (Stallings, 2016). In any given attack it might develop on the veritable
army of the zombie systems that are accustomed to launch the attacks at will.
Rogue access point
This is essentially an accessibility point that is included with a network without one
understanding. A person does not need the knowledge that it is there. This is an access point
which could generate some huge security issues. One is due given it could be simple to plug in
the wireless gain access to point in it. In case one does not do any type of the network access
control protocol on ones coverage, it might turn out to be easy for the additional workstations
and gain access to reveal be incorporated with a network.
Jamming
There are different security issues which have affected the wireless networks over the last few
years Stallings, 2016). It is known that an individual without comprehension of the networks can
easily establish a flawed and vulnerable network. For that reason, it is very important remember
that even their system administrators might lack understanding to the wireless network
implementations (Stallings, 2016). Currently there are various security challenges which affect
the wireless networks these are highlighted as follows;
DDoS attack
In the DDoS attacks, a hacker set up an application on the machine which afterwards along with
the other wireless networking systems might be called to take part in the attack (Stallings, 2016).
Considering that the DDoS attacks normally provide heavier volume of the messages they have
got the prospective to be much disruptive compared to simple DoS attacks that could derive from
one particular computer (Stallings, 2016). In any given attack it might develop on the veritable
army of the zombie systems that are accustomed to launch the attacks at will.
Rogue access point
This is essentially an accessibility point that is included with a network without one
understanding. A person does not need the knowledge that it is there. This is an access point
which could generate some huge security issues. One is due given it could be simple to plug in
the wireless gain access to point in it. In case one does not do any type of the network access
control protocol on ones coverage, it might turn out to be easy for the additional workstations
and gain access to reveal be incorporated with a network.
Jamming

INFORMATION SECURITY 6
The wireless interference translates to disruption of one’s network. This really is an
exceptionally significant problem particularly owing the fact that the wireless signals could
possibly be disrupted. This kind of the disturbance might be established by utilization of a
Bluetooth headset, a microwave or perhaps a cordless phone. This might generate the
transmission and receiving of the wireless networks to be a challenge.
Evil twin
A wireless evil twin usually comes into the play whenever the criminals are trying to generate a
rogue access points to be able to gain a having access to the network or simply access to the
information employed via the network. Determining the evil twin can be quite easy given that all
one demands would be to obtain a wireless access point, connect it into the network after which
configure it exactly as the current existing network . This is feasible when it comes to the open
access point which does not have any kind of passwords which are associated to them.
Packet sniffing
When the data has been sent back and forth over the coverage, it is sent out to the packet. Given
that the wireless traffic is dispatched over the air, it would be simple to capture. One can find
plenty of the traffic which is sent over the air which means there is certainly absolutely no
encryption and the files are in the plain text for virtually any person to check out. There is plenty
of the traffic which is sent in the clear meaning there is certainly simply no encryption and files
are in the plain text for any individual to read. Utilizing a tool for example the Wireshark allows
somebody to read the data transfers in the plan text. This might lead to stolen passwords or
leakages of the sensitive information much conveniently. The data which is encrypted may be
captured.
The wireless interference translates to disruption of one’s network. This really is an
exceptionally significant problem particularly owing the fact that the wireless signals could
possibly be disrupted. This kind of the disturbance might be established by utilization of a
Bluetooth headset, a microwave or perhaps a cordless phone. This might generate the
transmission and receiving of the wireless networks to be a challenge.
Evil twin
A wireless evil twin usually comes into the play whenever the criminals are trying to generate a
rogue access points to be able to gain a having access to the network or simply access to the
information employed via the network. Determining the evil twin can be quite easy given that all
one demands would be to obtain a wireless access point, connect it into the network after which
configure it exactly as the current existing network . This is feasible when it comes to the open
access point which does not have any kind of passwords which are associated to them.
Packet sniffing
When the data has been sent back and forth over the coverage, it is sent out to the packet. Given
that the wireless traffic is dispatched over the air, it would be simple to capture. One can find
plenty of the traffic which is sent over the air which means there is certainly absolutely no
encryption and the files are in the plain text for virtually any person to check out. There is plenty
of the traffic which is sent in the clear meaning there is certainly simply no encryption and files
are in the plain text for any individual to read. Utilizing a tool for example the Wireshark allows
somebody to read the data transfers in the plan text. This might lead to stolen passwords or
leakages of the sensitive information much conveniently. The data which is encrypted may be
captured.

INFORMATION SECURITY 7
Preventive techniques
There are many preventive techniques which are utilized to prevent the hacker from the access of
wireless network these approaches are as follows;
Usage of encryption to wireless network
When a person goes remote, it is important to scramble the data you are sending to the remote
system, to enable the hackers not access to the data. The use of encryption helps to scramble the
data which is sent into the code which prevents others from opening it. The use of the encryption
is the ideal technique to secure the system from the hackers. The two most types of encryption
technologies are Wi-Fi Equivalent Privacy and the Wi-Fi Protected Access. WPA2 is easily the
most technology which is secured and its utilization is applied on uncommon chances whenever
that decision is reached. The encryption algorithm for most of the time shields the network
against the standard software engineers (Liang & Yu, 2015). The WEP encryption algorithm just
happens to be working in certain seasoned switches, wherein there is certainly absolutely no
shielding against particular programs from the hackers. Access should be only permitted to
certain gadgets in order to gain access to the remote system. Each device which speaks with the
method is a Media Access Control. The isolated system generally allows specific gadgets with a
particular MAC location to get access to the system.
Securing of router
It is essential to protect system from attackers, over the internet by preserving the switch
protected. The switch is able to coordinate on the activity between nearby application and the
web. This is the first step to safeguard against any attack. In the event that the switches are not
secure, hackers can access the delicate data from the gadget and they are able to seize the control
Preventive techniques
There are many preventive techniques which are utilized to prevent the hacker from the access of
wireless network these approaches are as follows;
Usage of encryption to wireless network
When a person goes remote, it is important to scramble the data you are sending to the remote
system, to enable the hackers not access to the data. The use of encryption helps to scramble the
data which is sent into the code which prevents others from opening it. The use of the encryption
is the ideal technique to secure the system from the hackers. The two most types of encryption
technologies are Wi-Fi Equivalent Privacy and the Wi-Fi Protected Access. WPA2 is easily the
most technology which is secured and its utilization is applied on uncommon chances whenever
that decision is reached. The encryption algorithm for most of the time shields the network
against the standard software engineers (Liang & Yu, 2015). The WEP encryption algorithm just
happens to be working in certain seasoned switches, wherein there is certainly absolutely no
shielding against particular programs from the hackers. Access should be only permitted to
certain gadgets in order to gain access to the remote system. Each device which speaks with the
method is a Media Access Control. The isolated system generally allows specific gadgets with a
particular MAC location to get access to the system.
Securing of router
It is essential to protect system from attackers, over the internet by preserving the switch
protected. The switch is able to coordinate on the activity between nearby application and the
web. This is the first step to safeguard against any attack. In the event that the switches are not
secure, hackers can access the delicate data from the gadget and they are able to seize the control
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INFORMATION SECURITY 8
of the switch and direct the network to the deceitful sites. There is need to change the switch
name from the default one. Following the advancement in the technology, it is important to
ensure security to the switches through periodic updates.
Picking a reliable and exceptional secret word for remote system
The remote switch generally comes preset with the default secret key. Whenever setting an
excellent secret key for the remote system, it is very important to make sure that it is certainly
not less than twenty figures in length and it includes numbers, letters and distinct images
(Stallings, 2016). With this setting it could keep other individuals from getting to the system.
Steganography
When it comes to cryptography it protects the messages from being captured by parties which
are unauthorized (Stallings, 2016). This technique enables concealment of the message which is
sent and if it is certainly not discovered it makes the sender and receiver invisible. The use of the
technique provides security and at the same times some anonymity. All the information hiding
techniques which could be used to exchange the steganogram in the telecommunication network
is described by the use of this technique (Wright & Cache, 2015). The network steganography
usually uses the communication protocol to control the elements as well as their intrinsic
functionality.
Identification of any gaps in the literature by:
The literature gaps in the research would be discussed in the following ways;
Issues that you believe have been addressed in the current literature
of the switch and direct the network to the deceitful sites. There is need to change the switch
name from the default one. Following the advancement in the technology, it is important to
ensure security to the switches through periodic updates.
Picking a reliable and exceptional secret word for remote system
The remote switch generally comes preset with the default secret key. Whenever setting an
excellent secret key for the remote system, it is very important to make sure that it is certainly
not less than twenty figures in length and it includes numbers, letters and distinct images
(Stallings, 2016). With this setting it could keep other individuals from getting to the system.
Steganography
When it comes to cryptography it protects the messages from being captured by parties which
are unauthorized (Stallings, 2016). This technique enables concealment of the message which is
sent and if it is certainly not discovered it makes the sender and receiver invisible. The use of the
technique provides security and at the same times some anonymity. All the information hiding
techniques which could be used to exchange the steganogram in the telecommunication network
is described by the use of this technique (Wright & Cache, 2015). The network steganography
usually uses the communication protocol to control the elements as well as their intrinsic
functionality.
Identification of any gaps in the literature by:
The literature gaps in the research would be discussed in the following ways;
Issues that you believe have been addressed in the current literature

INFORMATION SECURITY 9
In the research report there are numerous issues which have been addressed; these are on
overview of the technology involved. The report has addressed on different wireless network
technologies and also their application (Wright & Cache, 2015). Challenges and the issues which
lie within the wireless network have been addressed and the preventive techniques which could
be used to address such issues from taking place in the future. These are important component in
regards to this research to enable individual learn aspects related to the wireless network security
which is becoming a major concern today and some individuals are not aware of how the
attackers are exploiting the system due to advancement of the technology.
Highlighting areas/issues that have not been addressed or adequately addressed
As much as the literature has highlighted on different aspects related to the wireless network
security and preventive mechanism there are various issues which have not been addressed.
Some of these issues relate to the fundamental of the wireless network and technologies which
could be incorporated and show how the implementation of the security mechanisms are done.
Moreover, there was need to show how each of the attack occurs and highlight on the methods
which each could be addressed. There are different techniques which address each challenge in
the system and this needed to be addressed in details. Moreover, there should have been practical
examples highlighted to show how an attack occurs and how to prevent such attacks.
Discussing your view(s) on the issue(s) that you see as being critical
From the literatures which have been highlighted wireless network security is very essential
today where there has been advancement in the technology and hackers have developed
sosphicated tools to gain access to the system. In the market there have been devices which are
used widely and these has resulted to increase in the attacks on the devices themselves and
mostly are focusing on the transactions. Threats and attacks are increasing are this is expected to
In the research report there are numerous issues which have been addressed; these are on
overview of the technology involved. The report has addressed on different wireless network
technologies and also their application (Wright & Cache, 2015). Challenges and the issues which
lie within the wireless network have been addressed and the preventive techniques which could
be used to address such issues from taking place in the future. These are important component in
regards to this research to enable individual learn aspects related to the wireless network security
which is becoming a major concern today and some individuals are not aware of how the
attackers are exploiting the system due to advancement of the technology.
Highlighting areas/issues that have not been addressed or adequately addressed
As much as the literature has highlighted on different aspects related to the wireless network
security and preventive mechanism there are various issues which have not been addressed.
Some of these issues relate to the fundamental of the wireless network and technologies which
could be incorporated and show how the implementation of the security mechanisms are done.
Moreover, there was need to show how each of the attack occurs and highlight on the methods
which each could be addressed. There are different techniques which address each challenge in
the system and this needed to be addressed in details. Moreover, there should have been practical
examples highlighted to show how an attack occurs and how to prevent such attacks.
Discussing your view(s) on the issue(s) that you see as being critical
From the literatures which have been highlighted wireless network security is very essential
today where there has been advancement in the technology and hackers have developed
sosphicated tools to gain access to the system. In the market there have been devices which are
used widely and these has resulted to increase in the attacks on the devices themselves and
mostly are focusing on the transactions. Threats and attacks are increasing are this is expected to

INFORMATION SECURITY 10
grow more seriously, through this research it has highlighted on some of the security concerns
which need to be addressed in the wireless network; the literature has offered preventive
techniques which individuals could utilize to keep themselves safe and prevent any occurring to
them. The literature is knowledgeable and would offer some insights that are crucial to the
wireless network security.
Summarize the future research directions based on the identified gaps.
The wireless network has risen in the usage and individual needs to know the security issues and
preventive techniques that are useful to help prevent them from the hackers. There gaps in the
literature which have been highlighted, these could be addressed whereby individuals needs to do
research in these areas (Wright & Cache, 2015). There is need for more research which focuses
on these aspects to enable individuals have more aware of the facets in regards to the wireless
network. The field is wide and there is more research that can be done to address on the current
issues affecting the wireless network technology.
grow more seriously, through this research it has highlighted on some of the security concerns
which need to be addressed in the wireless network; the literature has offered preventive
techniques which individuals could utilize to keep themselves safe and prevent any occurring to
them. The literature is knowledgeable and would offer some insights that are crucial to the
wireless network security.
Summarize the future research directions based on the identified gaps.
The wireless network has risen in the usage and individual needs to know the security issues and
preventive techniques that are useful to help prevent them from the hackers. There gaps in the
literature which have been highlighted, these could be addressed whereby individuals needs to do
research in these areas (Wright & Cache, 2015). There is need for more research which focuses
on these aspects to enable individuals have more aware of the facets in regards to the wireless
network. The field is wide and there is more research that can be done to address on the current
issues affecting the wireless network technology.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

INFORMATION SECURITY 11
References
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues
and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
Pierson, G., & DeHaan, J. (2015). U.S. Patent No. 9,203,837. Washington, DC: U.S. Patent and
Trademark Office.
Stallings, W. (2016). Cryptography and network security: Principles and practice. Pearson.
Wright, J., & Cache, J. (2015). Hacking exposed wireless: wireless security secrets & solutions.
McGraw-Hill Education Group.
References
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research issues
and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
Pierson, G., & DeHaan, J. (2015). U.S. Patent No. 9,203,837. Washington, DC: U.S. Patent and
Trademark Office.
Stallings, W. (2016). Cryptography and network security: Principles and practice. Pearson.
Wright, J., & Cache, J. (2015). Hacking exposed wireless: wireless security secrets & solutions.
McGraw-Hill Education Group.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.