IT 273 Discussion Unit 8
Wireless attacks have becoming a more common security issue when it comes to networks. Attacks can get a lot of information that is being sent across a network and use to commit crimes in other networks. Every wireless network is vulnerable to attacks and it is the important that all the necessary security measures are taken so as to prevent the mess these attacks can cause. These attacks are normally carried out to target information that is being shared through the networks. It is therefore very important to know of such attacks so you will be able to identify the attack when it happens.
I chose Bluejacking, evil twin and war driving for this discussion of wireless attacks.
Bluejacking is a kind of illegal activity that is similar to hacking and is able to send unsolicited messages to another device via Bluetooth. Bluejacking is not mobile hacking or hijacking its totally different. Bluejacking is a harmless prank. There is no accessing or taking private data from your victim's device. This is considered spam for Bluetooth. You usually see pop-up messages on your
…show more content…
With the availability of free Wi-Fi connection and GPS, they can drive around and obtain a very huge amount of information over a very short period of time. This is obtained in a vehicle with a mobile device and a special type of software to view all the different access points around an access point. With this information, the attacker comes up with a very large database of information and can gain access to a wireless signal.
Users that have a wireless LAN should add security to ensure only intended users have access. Some safeguards include use of WEP (Wired Equivalent Privacy) encryption, IPsec, WPA (WiFi Protected Access), with a firewall or DMZ. A DMZ (demilitarized zone) is a physical or logical sub-network that separates the LAN from other entrusted networks
1.11.6 and 2.3: I input relevant information accurately daily so that it is ready for processing. I do this by scanning in the forms we receive, after separating them into piles to group them for easy scanning. After I have scanned them all, I then use Xpress to start the processing. When I am doing so, I make sure I copy all the details accurately. This is very important, as I am dealing with personal and sensitive information received from the public. I take extra care when entering the digits, such as NI numbers or date of births. When inputting this information I am using a scanner, keyboard and mouse. I found that one reoccurring problem I had
To improve security, the Wi-Fi uses various built-in WEP encryption technologies to prevent attacks from
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication.
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
The first version of the 802.11 protocol was released in 1997, and was updated to 802.11b in 1999 to permit 11 megabits to be transmitted. But Wireless WANs (WWANs) network cover broader areas then WLANS and includes such things as cellular networks, cellular digital packet data, satellite networks, microwave networks, and much more. But Both WWANS and WLANs rely on the RF spectrum as there communication medium. The security measure for wireless users is strict, even though it can be accessed by walking near a building. Wireless signals are easy too pickup especially with a cellular device but it is usually password but still can access from intruders. But there are many way of preventing these hackers from entering in which will be explained later. Also for Mobile network/and its network security, its network operates on a radio frequency consisting of radio cells, each served by a fixed transmitter, and for both wireless and mobile networks, they have the advantage of mobility, flexibility, ease of installation, and low cost. But some drawbacks for both systems include Limited Throughput, Limited Range, in building penetration problems, vulnerability, and lastly security.
Wireless connectivity is critical to most homes and corporations as the world advances in technology. The technology has grown to a capacity that allows for extreme growth in wireless infrastructure as well as a trend of bringing your own technology device. Many corporations experience a high volume of critically important information being transferred over it wireless network so security is essential. There are many differences between a home and corporate wireless installation and each has its differences in securing.
Data Corruption: This attack is similar to the data modification attack, but the data is not only modified, but also destroyed, lost sometimes. The receiver may not receive the data. Strong radio signals are applied by the attacker which affects the data transmission signals. Thus, the receiver does not receive the accurate data, or any data
Within this article, the authors states that in order to provide a safe and secure wireless network, they outlined the counter attacks and measures for the security of wireless networks. Some of the counter attacks that the authors have listed includes, system security - which breakdowns to administrative level security, physical level security, and technical level security, and information security (Ameen et al, 2012). For the purpose of answering the previous question, the main counter attack that would best defend against the problems would be system security - particularly the administrative level security. At this level of security, administrative control over the system by establishing a well defined user hierarchy plus a strong authentication measures, can prevent security breaches of WLANs from
Some of you might be thinking, well the mobile app can be used from anywhere, what if the car is not nearby? For one that doesn’t matter, because they would only be doing what the user can from his own phone. But if the hacker wanted to steal property from within the car, he could do that too, because the app sends him geographical data as well.
There are two rules when it comes to making connections to wireless LAN networks. Rule number one; never allow your network to operate without setting encryption protocols such as WEP, WPA, and WPA2. When you allow your network to operate without a security protocol, your network and personal information are left vulnerable to attacks. Rule number two is similar to rule number one. Never connect to a network that is not secured by a security protocol. By doing this you also open yourself to attacks. Hackers sometimes make unsecured networks available to bait users into connecting. Once a user connects to an unsecured network the hacker can "sniff" any information that he or she wants and can potentially take over the users machine. In today's data technology driven world it is essential that wireless networks be protected are three popular ways to protect a wireless network, those
Bluejacking is sending of unrequested message over Bluetooth to Bluetooth-Enabled devices such as mobile phone, PDA or laptops, by sending a vCard which typically contain message in name field via OBEX protocol
In Today’s world multiple Wireless Local Area Networks (WLANs) can coexist in a airspace. Every wireless mobility devices tries to find the access point through probe request using a unique name that is the Service Set Identifier (SSID) of the network to make automatic authentication. As a wireless user you are concerned only with the broadcast SSIDs that let you connect to a WLAN. This paper discusses about the Wireless Mobility devices communication security issues using Basic Service Set Identifier BSSID or Extended Service Set Identifier ESSID which a network administrator need to keep track of. Also it discusses about the available flaws in it and how by modifying the probe request header we can make the connectivity more secure for the new generation of devices.
Abstract—Battery draining attacks exploit the resource limitation of modern mobile devices and have long been proved effective. However, most of the existing attack methods require sensitive information of the target in advance, which limits the effectiveness of this attack. This paper describes the design and implementation of a battery draining attack combined with Man-In-The-Middle attacks that requires as little information of the target as possible. The attack aims to be performed on any target connecting to a random public AP, to work on a wide range of devices automatically, and to drain the batteries covertly without notifications. Several implementations are tested, their battery draining speed measured and the best attack is able to speed up the battery usage 14.3 times. Pros and cons of this attack are discussed.
Attacks against mobile communication are not only depends on the network weaknesses but the reasons may be mobile phones malware, identity theft by SIM cloning and so on. Some other attacks, such as phishing with SMS, may exploit human factors as well. But most of these attacks are done on the A5 family of ciphering algorithms. The exact formulation of these algorithm is still unknown but many researchers try to calculate it through reverse engineering and cryptanalysis.