IT530 Assignment-Unit 6
No Name
Kaplan University
Prof: Jeffrey Robinson
03/15/2014
IT530 Assignment-Unit 6
Introduction
Wireless Security
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.
Mythology
The Concept of Wireless Security
There are different types of wireless networks, which connect a system to the internet without wires. There are two standards for wireless which are IEEE 802.11
References: Harris, E., Perlroth, N., Popper, N., & Stout, H. (2014), A Sneaky Path into Target, Customers’ Wallets, The New York Times., retrieved from http://www.nytimes.com/2014/01/18/business/a-sneaky-path-into-target-customers-wallets.html?_r=0 JP (2011), Real-world wireless security, JP Can Fix It, retrieved from http://jpcanfixit.com.au/wireless/ Wang, S. (2010), Different Security Protocols, eHow, retrieved from http://www.ehow.com/list_7160659_different-security-protocols.html TCP/IP Networking Protocol (n.d.), TCP/IP Protocols, retrieved, from http://www.comptechdoc.org/independent/networking How to Improve WiFi Reception (2012), How to Improve WiFi Reception, retrieved from http://freewimaxinfo.com/improve-wifi-reception.html Mitchell, B. (2014), 10 Tips for Wireless Home Network Security, About.com Wireless / Networking, retrieved from http://compnetworking.about.com/od/wirelesssecurity Types of Computer Networks, (2012), - LAN, retrieved from http://freewimaxinfo.com/computer-networks-types.html K.W. Ross, J. K. (2012), Presentation, retrieved from http://content-ist.kaplan.edu/IT530_1308D/topics/it530-06-r-03-reference_powerpoint.html Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm