preview

Personal Information Security Paper

Decent Essays

We are living in the world where we are required to yield our personal data information to authority or companies such as names, date of birth, social security number or even credit numbers (Magalhaes, 2012). We may be aware that the personal data can expose to unauthorized people if our data is not secure properly, either via wire or wireless network. Lost or stolen data has been seen while data is transferred between different users using both networks. Can we trust companies to keep our data safe from being lost or misuse? Yes, we can. With new cyber-crime laws are enforced, it is in the company's best interest to keep their customers' data more secure (Magalhaes, 2012). This article will summarize the major security risks and threats to …show more content…

According to Danzig, it took Mr. Kostolnik’s neighbor, who had no hacking experience was able to get to his Wi-Fi after buying the cracking Wi-Fi software. There are three encryption technologies: WEP, WPA and WPA2 where WPA and WPA2 can be are current encryption protocol with TKIP (a 128-bit key is generated per packet) and AES (a different 128-bit encryption), which are very difficult to crack. Changing the default SSID is another step to secure a Wi-Fi. The above picture shows some of the current wireless brand names like Motorola, Linksys or Netgear.
Although hiding the SSID, it is still being broadcast if something using apps like in SSIDer or Kismet can see it. The change helps mitigating the risk of the Wi-Fi name being found if it is being scanned. Filter Media Access Control (MAC) addresses or MAC address for short is a unique ID assigned to every network interface. Once, the MAC addresses are filtered. This will increase another security layer but it is possible for somebody to sniff the Wi-Fi traffic and then spoof the MAC address of their device to match one on the network by using tools like Wireshark, Ettercap, and Nmap in …show more content…

Some of the most common ones are Trojan horses, denial of service, e-mail spoofing, e-mail borne viruses and packet sniffing. A Trojan horse is a program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other

Get Access