Preview

The Ethics of Stealing a Wi-Fi Connection

Good Essays
Open Document
Open Document
648 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Ethics of Stealing a Wi-Fi Connection
The ethics of stealing a WiFi connection
[Name of the writer]
[Name of the institution]

The ethics of stealing a WiFi connection

Introduction There is a notion on the rise which is the stealing of WIFI and using it to access internet for several activities. However, then the point up rises is it ethical or unethical. First, tell it is unethical and illegal, to steal the neighbor 's WIFI network. However, if the case is that you want to learn how the systems can find more information on WIFI and avoid the WIFI from being stolen by your neighbors one have to put passwords and visibility options. Moreover, avoiding the unethical notions are very hard and creating the strategy that focuses upon the problems is more sort of a challenge, but the stealing of WIFI is an unethical issue which is seem to be increasing (Rowell, 2006).

Discussion If you knew your neighbors request leaves open the door of his house open when going to work, probably never consider to go home and watch channels premium cable without your permission. However, if you turn on your laptop and see that you can connect to your neighbor 's wireless network and Internet access for free, would be in an ethical dilemma. This is the notion because many people do not know how to protect their wireless home network. Thus, many people leave their networks accessed by an entire neighborhood or by people walking near their homes. One study found that 14% of wireless network owners have accessed the wireless connection to your neighbor. In some cases, people guided by a neighborhood looking for a house with open wireless and parked in front of the house for hours while surfing the Internet. Many have canceled their services to secretly use the stolen full-time connections. In many areas, the law on the unauthorized use is ambiguous or does not exist at all (Rowell, 2006). However, there is a notion that this type of theft, illegal or not is definitely unethical. Well the question



References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12. Rowell, L (2006), Wi-Fi and the morality of sharing, ACM Digital Library, Vol. 10-(2).

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    3. E-commerce involves the passing of sensitive information like credit card numbers or bank account numbers over the internet, and the risk of losing the privacy of this information is high in public places. –Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. –Evil twin hotspots: these are hotspots setup by a hacker and made available to the public. Unknowing users who connect to the intent using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSl encrypted and look for a valid security certificate.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Although the Internet is available to everyone anywhere in the world but not everyone is equipped with the same level of ethical value. Some would have assumed their personal responsibility to respect other’s property and privacy, some…

    • 926 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The movie “Control Room” is a movie that was based on the Iraq war in the late…

    • 770 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cilantro Research Paper

    • 519 Words
    • 3 Pages

    Imagine having just finished a long, stressful day of school on a rainy Tuesday when suddenly you hear your stomach growling vigorously as it cries out for food. As you contemplate whether to eat at home or at a restaurant, you slip your hands into your pockets and, to your surprise, find a five-dollar bill. Making an opportunity out of the discovery of the money just scavenged, you decide to walk over to Chacho’s to partake in the infamous “Taco Tuesday.” Once seated, you are instantly swayed by the aroma of beef to order carne asada tacos. Soon after, you are approached by a lanky waiter who takes your order then returns with your food not too long after. At the arrival of your food, you are appalled by what you see: a plate of tacos garnished completely with the…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    Sangani asserts that Google’s browser computed a program that would initially concoct pictures of almost all streets located along with 30 countries between the year of 2006 and 2010. The program was addressed as “Google Streetview” (Sangani, par. 4). “Civil-rights advocates” alleged that Google forced rules upon what one could broadcast or search on the Web. Therefore, the newly designed program had quickly failed amidst the campaigners. The cameras of Google Streetview did not only capture pictures. Unfortunately, users of the program were being scammed by having their personal information swiped through “public and unprotected Wi-Fi access routers.” The personal information was combined with previously frequented Web sites and also emails. The “router owners” did not know that any of this information was being compiled at the…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Corporate Misconduct

    • 375 Words
    • 2 Pages

    What is and what is not ethical can be defined different ways by different people. What may be unethical to one person may not be so unethical to someone else. These values can depend of how someone was raised, the type of environment that they were accustomed to, and even how they carry themselves day to day. Ethics is simply defined as a set of moral principles or values that governs the conduct of an individual or a group (Cheeseman, 2010, p. 666). When taking something that does not belong to you and use it as if it were yours, to me is simply unethical.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    Hacktivism is the very recent adaptation of computer hacking by political activists to achieve their goals. It presents society with a new problem because of the current fear of cyber terrorism, and the difficulty of telling them apart. This work attempts to ethically assess hacktivism using the classical consequential and deontological theories as well as to address hacktivist claims of civil disobedience. In the end, the classical theories present may problems while attempting to translate them to the informational and virtual real. A new framework is developed so that it may be possible to tell the difference between ethical and unethical acts of hacktivism so that they are no longer dangerously confused with cyber terrorism.…

    • 7214 Words
    • 29 Pages
    Powerful Essays

Related Topics