preview

The Impact Of Wireless Network On Public Environments And Office

Good Essays

1. Introduction
Use of wireless network has tremendously increased and deployed both in the public environments and office, besides the Internet users at home. Apart from this wireless networking medium comes up with many advantages like productivity enhances because of the increased availability to resources. Configuring and reconfiguring of the network has become very easy. The users want this communication medium to be secure and free from attackers. Despite wireless networking comes up with many countermeasures against attacks, besides this it also has also new threats and modifies the authorized information security risk profile. For example, lets us consider a scenario where message or data is been transmitted between two parties …show more content…

Some of the risks are similar to those of wired networks and some are new. May be the most important source of risks is the technology’s fundamental communication medium, the channel is open to attackers and intruders making it consistent as an Ethernet port.

2. Wireless Vulnerabilities, Threats and Countermeasures
The wireless network consists of four fundamental components: The transmission of data, utilizing radio frequencies, Access points (AP) which provide a connection to the organization 's network or private network and users. All of these components provide a way for an attack which can result in compromise of security objectives of availability, integrity and confidentiality.

2.1 Wireless Network Attacks
Some of wireless network attacks are discussed below. Attacks can be classified into two types
1) Passive attacks
2) Active attacks
Passive attacks are those types of attack in which the attacker tries to obtain the information that is being transmitted or received by the network. These types of attacks are usually very difficult to detect as there is no modification of the contents by the attacker. There are two types of passive attack and these are traffic analysis and eaves dropping. The passive attack is contains two types of attacks.
On the other hand, active attacks where the attacker not only gains access to the

Get Access