Preview

The Concept of Wireless Security

Powerful Essays
Open Document
Open Document
1936 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Concept of Wireless Security
Running head: IT530 ASSIGNMENT UNIT 6

IT530 Assignment-Unit 6
No Name
Kaplan University
Prof: Jeffrey Robinson
03/15/2014

IT530 Assignment-Unit 6
Introduction
Wireless Security
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.

Mythology
The Concept of Wireless Security
There are different types of wireless networks, which connect a system to the internet without wires. There are two standards for wireless which are IEEE 802.11



References: Harris, E., Perlroth, N., Popper, N., & Stout, H. (2014), A Sneaky Path into Target, Customers’ Wallets, The New York Times., retrieved from http://www.nytimes.com/2014/01/18/business/a-sneaky-path-into-target-customers-wallets.html?_r=0 JP (2011), Real-world wireless security, JP Can Fix It, retrieved from http://jpcanfixit.com.au/wireless/ Wang, S. (2010), Different Security Protocols, eHow, retrieved from http://www.ehow.com/list_7160659_different-security-protocols.html TCP/IP Networking Protocol (n.d.), TCP/IP Protocols, retrieved, from http://www.comptechdoc.org/independent/networking How to Improve WiFi Reception (2012), How to Improve WiFi Reception, retrieved from http://freewimaxinfo.com/improve-wifi-reception.html Mitchell, B. (2014), 10 Tips for Wireless Home Network Security, About.com Wireless / Networking, retrieved from http://compnetworking.about.com/od/wirelesssecurity Types of Computer Networks, (2012), - LAN, retrieved from http://freewimaxinfo.com/computer-networks-types.html K.W. Ross, J. K. (2012), Presentation, retrieved from http://content-ist.kaplan.edu/IT530_1308D/topics/it530-06-r-03-reference_powerpoint.html Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm

You May Also Find These Documents Helpful

  • Best Essays

    IEEE 802.11 – Wireless LAN • http://www2.rad.com/networks/2005/wirelesslan/main.htm • Up-to-date information on Wireless LANs. Technical/Magazines Articles…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The use of wireless technology in business and everday life is prevelant in today’s society as a whole. I have a wireless phone use, use Bluetooth and wireless internet on my laptop, as well as being able to transmit ans share internet, in my home and…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Home users tend to have a variety of devices they like to connect wirelessly to the internet and to each other. While at home, users can use a wireless router provided by their ISP or they buy a wireless router that can be connected to the home wired network to provide wireless functionality. Because of the high-price of smartphone hotspots use, few home users use their smartphone network to connect their other devices to the internet. Other ways that home users can connect wirelessly are through ISPs that provide satellite or microwave connections.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    Cited: Ciampa, M. (2012). Security guide to network security fundamentals. (4 ed.). Boston: Course Technology, Cengage Learning.…

    • 2847 Words
    • 12 Pages
    Better Essays
  • Better Essays

    during this phase. It is our job as forensic investigators to be able to prove the evidence we collected is valid and that the techniques that we use can cause no damage or altering of any of the media devices we gathered. We must prove to the court that the evidence we collected has maintained the integrity of the court by following evidence check in and check out rules, date, time and investigator name and the mathematical techniques that are used to maintain the authentication of the wireless device.…

    • 1923 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Physical Security

    • 724 Words
    • 3 Pages

    References: Bogue, R (2003,08,11). Lock it down: don 't overlook physical security on your network.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    Wired Equivalent Privacy (WEP) is a protocol for encrypting wirelessly transmitted packets on IEEE 802.11 networks. In a WEP protected network, all packets are encrypted using the stream cipher RC4 under a common key, the root key1 Rk. The root key is shared by all radio stations. A successful recovery of this key gives an attacker full access to the network. Although known to be insecure and superseded by Wi-Fi Protected Access (WPA) [18], this protocol is still is in widespread use almost 6 years after practical key recovery attacks were found against it [5,15]. In this paper we present a new key-recovery attack against WEP that outperforms previous methods by at least an order of magnitude. First of all we describe how packets are encrypted: For each packet, a 24-bit initialization vector (IV) IV is chosen. The IV concatenated with the root key yields the per packet key K = IV||Rk. Over the data to be encrypted, an Integrity Check Value (ICV) is calculated as a CRC32 checksum. The key K is then used to encrypt the data followed by the ICV using the RC4 stream cipher.…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Satisfactory Essays

    Samsung Strategy Map

    • 250 Words
    • 1 Page

    |Communication and Networking » »» » » » » |Access network architecture, security, radio air interface |…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Zigbee

    • 989 Words
    • 4 Pages

    Contact Us • INTRODUCTION TO WIRELESS NETWORKS • COMPUTER NETWORKS AND NETWORK TYPES • COMPUTER NETWORKS TOPOLOGIES • Zigbee Technology • Zigbee Networks • Zigbee Architecture • How to make computer network • Local Area Network - LAN • Metropolitan Area Network (MAN) • Storage Area Network (SAN) • Desk Area Network (DAN) • Personal Area Network (PAN) • Campus Area Network (CAN) • Virtual Private Network (VPN) • How Wireless Network Works • Disadvantages of Wireless Networks • Wireless Networks Limitations • Computer Network Security • WIDE AREA NETWORK (WAN) • Trends & Developments in WAN Technology • WIRED NETWORKS CONNECTIONS • WHAT IS…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Sms Based Control System

    • 3369 Words
    • 14 Pages

    The based solution is to develop home security system using a wireless to keeps your house safe from intruders and enables you to work in IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 02, Aug 2011 ISSN (Online): 2231-5268 www.ijcsms.com IJCSMS www.ijcsms.com 20 peace. Based on the events above, the project can be developing to make our home secure and safe. We never anxious and worried anymore even we leave the house. So this system is to design and develop a home security system that can provide security against intrusion and other emergency situation by alarm via short message service (SMS).…

    • 3369 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    References: [1] W. W. Lu,“Open Wireless Architecture and Its Enhanced Performance”, IEEE Commun. Mag., Vol. 41, No. 6, June 2003, pp. 106–07. [2] A. Shamir,“Identity-Based Cryptosystems and Signature Schemes”, Proc. CRYPTO ’84, LNCS196, Springer-Verlag, 1985, pp. 48–53. [3] G. M. Koien,“An Introduction to Access Security in UMTS,” IEEE Wireless Commun., Vol. 11, No. 1, Feb. 2004, pp. 8–18. [4] J. C. Chen, M. C. Jiang, Y. W. Liu,“Wireless LAN Security and IEEE802.11i,” IEEE Wireless Commun., Vol. 12, No. 1, Feb. 2005, pp.27–36. [5] L. Zhou, Z. J. Haas,“Securing Ad-Hoc Networks,“IEEE Network, Vol. 13, No. 6, Nov./Dec. 1999. [6] P. Papadimitratos, Z. J. Haas,“Secure Routing for Mobile Ad-Hoc Networks”, Proc. SCS Commun. Networks and Distrib. Sys. Modeling and Simulation Conf., Jan. 2002, pp. 27–31. [7] M. G. Zapata,“Secure Ad-Hoc On-Demand Distance Vector Routing”, ACM Mobile Comp. Commun. Rev., Vol. 6, No. 3, July 2002, pp.106-07. [8] A. Juels et al.,“Minimalist Cryptography for Low-Cost RFID Tags”, Proc. 4th Int’l. Conf. Security in Commun. Networks, LNCS 3352, Springer-Verlag, 2004, pp-149-64. [9] Bok Yong Choi, Deok Gyu Lee,“RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing”, SpringerLink, Vol. 344/2006,4, Oct 2006, pp. 1068-1077. Arshi Shamsi received his B.Tech. degree in computer science from Vira College of Engineering,(from U.P.T.U. Lucknow) Bijnor, India, in 2004 and pursuing M.Tech. degree in Computer Science from Al-Falah School of Engineering and Technology,(Maharishi Dayanand University, Rohtak) Haryana. He is working as Assistant Professor, with Department of Computer Science, at IIMT Engineering College. He is having a total work experience of 7 years. Shahroukh Khan received his B.Tech. degree in computer science & Engg from Shri Ram Murti Smarak College of Engineering & Technology, Bareilly, India, in 2007 and pursuing M.Tech(CSE) Degree in Computer Science from Al-Falah School of Engineering & Technology (M. D. University, Rohtak, Haryana). He is working as Lecturer,…

    • 3434 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    voting

    • 7263 Words
    • 30 Pages

    Abstract — Voting process in today’s era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a…

    • 7263 Words
    • 30 Pages
    Good Essays