Security of the Wired and Wireless Networks

Subject: Tech & Engineering
Pages: 3
Words: 816
Reading time:
4 min
Study level: College

Introduction

First of all, it is necessary to mention that in spite of the development of IT, and increase of the comfort of using the latest achievements of the humanity, the issues of safety stay eternally the hot problem for any user. The case study only revealed the fact that wireless communication technologies are rather vulnerable to various harmful attacks, especially, if not properly defended against them.

In only 3 hours we’ll deliver a custom Security of the Wired and Wireless Networks essay written 100% from scratch Get help

Safety Measures and Techniques

The fact is that wireless networks are common for individual and corporate use. The contemporary laptops have wireless connection cards installed, which allows their users to use all the conveniences of wireless communication and internet surfing. Surely, the opportunity to enter the network staying mobile promises lots of benefits, still the open character of such communication is dangerous for being subjected to anonymous attacks and interception of personal data. Hackers find the wireless networks comparatively easy to break into and steal or harm concealed information, deface web pages, send anonymous letters of blackmail.

Consequently, it appears to be rather important for companies and individuals to define effective wireless security policies that guard against unauthorized access to important resources. Lohmeyer (2002) emphasizes the following on the issues of wireless security: “Running a home network with no security is akin to unlocking your door and hanging a sign on your house inviting thieves inside to steal. It’s easy to see how for someone with no real training, figuring out how to protect yourself might seem nearly impossible

There are numerous risks closely linked with the used security protocols encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level. Taking this fact into account it is necessary to mention that the cracking methods and techniques have become even more sophisticated and innovative, as wireless technologies often presuppose the increased levels of privacy: it is not so easy to define the users of the open Wi-Fi network. Moreover, a cracker may be sitting out in the parking lot and intercept info from the unrestricted Wi-Fi spot by the means of a laptop or some other devices as handhelds, or even break in through this wireless card-equipped laptop and gain access to the wired network.

As for the technical issues of security, it is necessary to emphasize that all Wi-Fi equipment supports encryption of the data. Hundt, Stagg, and Richards (2008) state that encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. The only problem in the encryption of the data is that all Wi-Fi devices in the network must have identical encryption settings. Another technique is described in Christensen (2008) “Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor’s router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.

Originally, the risks of using internet technologies increase with the increase of the number of their users. When the wireless connections were few, the crackers and hackers did not mention them and did not aim to break the security barriers for making harm or stealing the information. If the network is restricted, and every user is registered and authorized, there will be no motivation for making harm to other users, but these attempts will be discouraged essentially.

Six Credit Cards

As it is stated in the case study, Mozurkewich speculates that the hack may have begun as a wardriving exercise a legal pastime in which hackers search out and map wireless access points that went too far. “The sense I’m getting is they were messing around, and things just snowballed,” says Mozurkewich. “We don’t agree with this kind of behavior at all, but it’s understandable to some point. It just goes to show a certain amount of immaturity.” Originally, these credit cards were the previously selected victims of the hacking, consequently, nothing could prevent them from being hacked. It is known, that nothing can stop an experienced cracker if he or she has a clearly defined target. It is hardly believable, that the victims were random, as the cracking of a credit card requires essential technical, theoretical, and practical preparation (including experience and intuition).

Academic experts
available
We will write a custom Tech & Engineering essay specifically for you for only $16.00 $11/page Learn more

Conclusion

Finally, it should be stated that the security of the wired and wireless networks depends solely on the professionalism of the system administrator and the absence of negligence among users. Originally, there are lots of security options available for the computer networks and communication systems, however, if the attack is properly planned and prepared, it will be very difficult to stop and almost impossible to prevent it, still, there is a strong necessity to be prepared for random attacks, as more than 90% of all hacking attacks are occasional.

References

Christensen, Adam. “‘Wi-Fi’ght Them When You Can Join Them? How the Philadelphia Compromise May Have Saved Municipally-Owned Telecommunications Services.” Federal Communications Law Journal 58.3 (2008): 683.

Gerstein, Daniel M. Securing America’s Future: National Strategy in the Information Age. Westport, CT: Praeger Security International, 2005.

Hundt, Reed E., Stagg Newman, and John E. Richards. “Wi-Fi Goes to Washington: A New Technology Could Not Only Restart Economic Growth but Also Help Connect Everyone, Everywhere to the Internet-At Low Cost.” The McKinsey Quarterly (2008): 150.

Lohmeyer, Daniel F., Jim Mccrory, and Sofya Pogreb. “Managing Information Security.” The McKinsey Quarterly (2002): 12.