1. Introduction
Use of wireless network has tremendously increased and deployed both in the public environments and office, besides the Internet users at home. Apart from this wireless networking medium comes up with many advantages like productivity enhances because of the increased availability to resources. Configuring and reconfiguring of the network has become very easy. The users want this communication medium to be secure and free from attackers. Despite wireless networking comes up with many countermeasures against attacks, besides this it also has also new threats and modifies the authorized information security risk profile. For example, lets us consider a scenario where message or data is been transmitted between two parties
…show more content…
Some of the risks are similar to those of wired networks and some are new. May be the most important source of risks is the technology’s fundamental communication medium, the channel is open to attackers and intruders making it consistent as an Ethernet port.
2. Wireless Vulnerabilities, Threats and Countermeasures
The wireless network consists of four fundamental components: The transmission of data, utilizing radio frequencies, Access points (AP) which provide a connection to the organization 's network or private network and users. All of these components provide a way for an attack which can result in compromise of security objectives of availability, integrity and confidentiality.
2.1 Wireless Network Attacks
Some of wireless network attacks are discussed below. Attacks can be classified into two types
1) Passive attacks
2) Active attacks
Passive attacks are those types of attack in which the attacker tries to obtain the information that is being transmitted or received by the network. These types of attacks are usually very difficult to detect as there is no modification of the contents by the attacker. There are two types of passive attack and these are traffic analysis and eaves dropping. The passive attack is contains two types of attacks.
On the other hand, active attacks where the attacker not only gains access to the
Wireless security in 802.11 is less robust and has many security flaws that can be exploited by an attacker. Security best practice for wireless networks depends on a defense in depth strategy, with five control layers:
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
Wireless attacks have becoming a more common security issue when it comes to networks. Attacks can get a lot of information that is being sent across a network and use to commit crimes in other networks. Every wireless network is vulnerable to attacks and it is the important that all the necessary security measures are taken so as to prevent the mess these attacks can cause. These attacks are normally carried out to target information that is being shared through the networks. It is therefore very important to know of such attacks so you will be able to identify the attack when it happens.
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.
Wireless connectivity is critical to most homes and corporations as the world advances in technology. The technology has grown to a capacity that allows for extreme growth in wireless infrastructure as well as a trend of bringing your own technology device. Many corporations experience a high volume of critically important information being transferred over it wireless network so security is essential. There are many differences between a home and corporate wireless installation and each has its differences in securing.
The IEEE 802.11 standard ensures that all stations, both radio-based network interface cards (NICs) and access points, implement access methods for sharing the air medium. When installing wireless LANs (WLAN), most people don't give much thought to these mechanisms. A detailed understanding of 802.11's medium access methods, however, will enable the user to deal more effectively with issues such as radio frequency interference, denial of services attacks and throughput
Within this article, the authors states that in order to provide a safe and secure wireless network, they outlined the counter attacks and measures for the security of wireless networks. Some of the counter attacks that the authors have listed includes, system security - which breakdowns to administrative level security, physical level security, and technical level security, and information security (Ameen et al, 2012). For the purpose of answering the previous question, the main counter attack that would best defend against the problems would be system security - particularly the administrative level security. At this level of security, administrative control over the system by establishing a well defined user hierarchy plus a strong authentication measures, can prevent security breaches of WLANs from
Network Security Issues – major threats and the means to fight them Network security issues are the top priority of all who want to protect their data.
Our society is becoming more and more reliant on wireless connections. The ability for both employees and consumers to connect wirelessly is a must in this day and age for businesses. Because of this, strict security policies must be put in place in order to keep the business and its data secure. This paper will discuss the pros and cons of wireless connections, the need for authentication and six top threats that companies should be aware of and how to prevent them.
In today society, Information Technology (IT) managers are facing their fears of different cyber security vulnerabilities faced by different network. The vulnerabilities being either unknown or known makes it challenging for an Information Technology manager to keep the network secure. Organizations prefer to deal with wireless network because of what it can offer. According to Cisco, wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With untethered access to documents, emails, applications and other network resources, employees can roam where they need to and have constant access to the tools required to do their jobs (Five Reasons to Go Wireless).
An increasing number of workers is using computers away from their desks. It seems to be more common in some professions such as consultants, salesmen, accountants, and engineers. When using mobile devices, companies’ sensitive data are accessed from any locations. Mobile computing is done through the use of wireless networks, and every time we think of a network, we need to discuss security issues.
Systems today require great security; however WLANS have some special security necessities. This segment looks at some of the security requirements for WLANS and security alternatives. WLANs are prone to various vulnerabilities that don 't exist for wired Ethernet LANs. Such vulnerabilities provide hackers unauthorized access to network. Different vulnerabilities may be brought about by a well intentioned however clueless worker who introduces an AP without the IT division 's endorsement, with no security. This would permit anybody to get access to whatever remains of the Enterprise 's network.
The various types of network equipment, such as routers, firewalls, and switches, have security weaknesses that should be recognized and protected against. These weaknesses include the following: