Eric Adom ISSC641 Week 4 outline

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

641

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

7

Uploaded by Oscarpinto100

Report
1 Student: Eric Adom Class: ISSC641 Institution: APUS/AMU Instructor: David Andersson Date: 02/28/2024
2 Outline of Wireless Technology Security I. Introduction A. Definition of wireless technology - Wireless technology is a technology that allows communication between entities without the need for cables or wires. - It entails the transmission of electromagnetic signals through the air. B. Importance of wireless technology in organizations - Wireless technology allows communication without the connection of cables (Franjic, 2022). - Wireless technology helps extend connection in an organization. - Wireless technology enhances mobility and flexibility (Franjic, 2022). C. Growing concerns about wireless technology security - Increased dependence on the use of wireless technology in organizations to provide essential services. - Wireless technologies are used to transfer sensitive data, including personal and financial information. - Wireless technologies have become targets of constantly evolving cyber-attacks. II. Overview of wireless technology A. Wi-Fi - Wi-Fi is a wireless networking technology that uses radio waves to facilitate high- speed Internet connectivity. - Wi-Fi is vulnerable to many cyber security issues because it lacks physical barriers.
3 B. Bluetooth - Bluetooth uses short-range radio frequency to communicate with devices with this technology if they are within the designated distance. - Connects devices for voice and data transfer. - Security considerations for Bluetooth include bluejacking and bluesnarfing. C. Cellular networks - Cellular networks refer to wireless radio or digital networks distributed over cells. - Cellular networks are vulnerable to cyber-attacks. III. Security threats facing wireless technology A. Denial of Service (DoS) attacks - DoS attacks deny legitimate users access to a service provider. - DoS disrupt services by limiting access to the service or machine instead of subverting the service (Patil & Chaudhari, 2016). B. Spoofing attacks - Spoofing attacks involve an attacker pretending to be legitimate use to access the network resources (Hakeem et al., 2022). C. Eavesdropping attacks - Eavesdropping attacks involve unauthorized third parties intercepting data packets over a network. IV. Security measures and protocols for wireless technology A. Encryption - Encryption entails converting digital plaintext information to ciphertext that humans cannot easily comprehend (He et al., 2021).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help