Eric Adom ISSC641 W7 Final Research Paper

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

641

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

10

Uploaded by Oscarpinto100

Report
1 Wireless Technology Security Student: Eric Adom Class: ISSC641 Institution: APUS/AMU Instructor: Dr Andersson Date: 03/21/2024
2 Wireless Technology Security Wireless technologies have become integral to contemporary society, transforming how people communicate, interact and work. They have permeated each sector of life, from the Wi-Fi networks in homes and organizations to cellular networks facilitating seamless connectivity on the go. Wireless technology is a technology that allows communication between entities without the need for cables or wires. It involves the transmission of electromagnetic signals through the air. Organizations prefer wireless technology for its cable-free communication, extended connectivity, and enhanced mobility (Franjic, 2022). However, their widespread adoption raises significant security concerns due to vulnerabilities exploited by malicious actors. Wireless technology security is a significant concern due to its critical role in providing essential services, transferring sensitive data, and being a target of evolving cyber-attacks, posing considerable challenges to organizations. This paper explores wireless technologies, focusing on the security threats facing these technologies and how they can be addressed. Overview of Wireless Technology Wi-Fi is one of the main types of wireless technology. It is a wireless networking technology that uses radio waves to facilitate high-speed Internet connectivity. Since it lacks physical barriers, it is vulnerable to many cyber security issues, such as exploitation of passwords. Over the years, the security of Wi-Fi technologies has been enhanced in response to the increased vulnerabilities of this wireless technology. Some security protocols and features for securing Wi-Fi include Wi-Fi Protected Access 2 (WPA2), which encrypts data transmitted over Wi-Fi networks to prevent unauthorized access. WPA3, an improved WPA2 version with more robust security features and encryption, is another measure to enhance Wi-Fi security (Irei, 2022).
3 Bluetooth is another type of wireless technology. It uses short-range radio frequency to communicate with devices if they are within the designated distance. This technology connects devices for voice and data transfer. The primary security considerations for Bluetooth technology are bluejacking and bluesnarfing. Some of the security measures used to enhance Bluetooth technology's security are Bluetooth low energy and secure pairing methods. Cellular networks are the other type of wireless technology. They refer to wireless radio or digital networks distributed over cells. Cellular networks offer mobile communication services. These networks have experienced significant advancements from 3G to 5G, enhancing connectivity, latency, and speed. Cellular networks are vulnerable to SIM card cloning and base station attacks. Some security measures to secure cellular networks include network slicing and authentication methods. Security Threats Facing Wireless Technology Denial of Service (DoS) Attacks One of the major threats facing wireless technology is the DoS attacks. The DoS attacks refer to a situation where the attackers flood the wireless devices or networks with excessive traffic, causing the network to become overwhelmed. According to Patil and Chaudhari (2016), the DoS attacks aim to disrupt normal services by limiting legitimate users from accessing the service (p.715). The DoS often targets network connectivity or bandwidth, causing it to be incapable of performing its services. The DoS attacks may significantly impact organizations, especially e-commerce organizations, because these threats will make the services unavailable. Spoofing Attacks The spoofing attacks represent another major security threat to the wireless technologies. These attacks refer to cases where an individual or program effectively pretends to be a
4 legitimate user by misrepresenting the data to gain access to the network system. Hakeem et al. (2022) observed that spoofing attacks fall under brain-computer interaction attacks since they deceive the network system into believing the data. The spoofing attacks cause the network system to experience a decline in performance. They also make the website unavailable or limit access to all websites on a given network. Eavesdropping Attacks The eavesdropping attacks are other significant security threats facing wireless technology. These attacks happen when the attackers intercept, alter or delete data packets transmitted over the unsecured wireless networks. So, the eavesdropping attacks focus on data in transit. It can be challenging to notice eavesdropping attacks because they do not affect the normal functioning of wireless technology systems. Eavesdropping attacks may lead to financial losses and identity theft. Cyber attackers may sell the sensitive information obtained from the victim organization's competitors. Also, the loss of organizational information tarnishes the organization's reputation, making it lose customers. In some cases, eavesdropping inadvertently discloses sensitive information that the attackers might utilize to engage in more identity theft attacks. Security measures and protocols for wireless technology Encryption Encryption is one of the security measures for enhancing the security of wireless technology. It entails converting digital plaintext information to ciphertext that humans cannot easily comprehend (He et al., 2021, p.1). Encrypting wireless technologies can help improve data confidentiality, integrity, and authentication. Although encryption is a good security measure, organizations should focus on adopting strong encryption standards like WPA3 and Advanced
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help