preview

It 273 Unit 8 Essay

Decent Essays

IT 273 Discussion Unit 8
Wireless attacks have becoming a more common security issue when it comes to networks. Attacks can get a lot of information that is being sent across a network and use to commit crimes in other networks. Every wireless network is vulnerable to attacks and it is the important that all the necessary security measures are taken so as to prevent the mess these attacks can cause. These attacks are normally carried out to target information that is being shared through the networks. It is therefore very important to know of such attacks so you will be able to identify the attack when it happens.

I chose Bluejacking, evil twin and war driving for this discussion of wireless attacks.
Bluejacking is a kind of illegal activity that is similar to hacking and is able to send unsolicited messages to another device via Bluetooth. Bluejacking is not mobile hacking or hijacking its totally different. Bluejacking is a harmless prank. There is no accessing or taking private data from your victim's device. This is considered spam for Bluetooth. You usually see pop-up messages on your …show more content…

With the availability of free Wi-Fi connection and GPS, they can drive around and obtain a very huge amount of information over a very short period of time. This is obtained in a vehicle with a mobile device and a special type of software to view all the different access points around an access point. With this information, the attacker comes up with a very large database of information and can gain access to a wireless signal.
Users that have a wireless LAN should add security to ensure only intended users have access. Some safeguards include use of WEP (Wired Equivalent Privacy) encryption, IPsec, WPA (WiFi Protected Access), with a firewall or DMZ. A DMZ (demilitarized zone) is a physical or logical sub-network that separates the LAN from other entrusted networks

Get Access