Preview

War Driving

Powerful Essays
Open Document
Open Document
1481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
War Driving
War Driving With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections. Wireless internet connections began in the 1970’s with the creation a wireless network in Hawaii called the ALOHANET, which connected seven computers on four separate islands (Goldsmith). Comparing this system to the ones we use today would show many advances in technology since the creation of the ALOHANET. Though this is the first recorded wireless network put in use, the idea of the World Wide Web began twenty years earlier with a group of scientists in the United States who saw a need for such a network (Goldsmith). With the invention of wireless transmission came the dangers of information being corrupted and/or intercepted by people who did not have permission to access such information and the battle to prevent such actions began. Today one of the dangers faced by anyone using a wireless connection without the correct security protocols is the act of war driving. War driving has a connection to war dialing which was seen in the 1980s movie, War Games. War dialing is a process of dialing all the telephone numbers in a certain area searching for those containing computer connections via a modem. As a research project, Peter Shipley showed the vulnerabilities in unprotected modems by war dialing phone numbers in the Bay Area of San Francisco in the late nineties (Poulsen). This war dialing experiment led to his discovery of many unprotected modems belonging to banks, hotels,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    What is war driving? War driving is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere. To do war driving, you need a car, a laptop, a wireless Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be mounted on top of or positioned inside the car.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Our online world is totally incomplete without a modem or router and nowadays, technological advancements have made it possible for us to use wireless routers which in itself is a remarkable achievement of computer science.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Better Essays

    Frankk, D. (2012, May 25). Important Security Issues in Wireless Networks. Retrieved from Examiner.com: http://www.examiner.com/article/security-issues-wireless-networks…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Internet Security

    • 1945 Words
    • 8 Pages

    also make it an ideal way for someone to keep a careful watch on the user…

    • 1945 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The End Of Privacy

    • 1056 Words
    • 5 Pages

    A user could speak with a person miles away just as if they were right beside one another. Because of this convenience, telephones began to be mass produced and within ten years 150,000 people owned telephones. Users enjoyed the convenience and privacy of this method of communication and being able to talk to people within their own homes. However, just like eavesdropping in real life, the first real invasion of privacy began with wiretapping. Wiretapping allowed users to tap into phone lines and listen in on conversations. This information could be sold by a private investigator to another citizen or could be sold to a company for corporate espionage (Kaplan, 2012). The idea of selling information gained from these new sources of technology followed into the largest form of peer to peer communication today, the internet. The internet was initially created in order to send data between two computers without the need to transport individual drives. Just like with the telephone, this information could be intercepted and sold to provide information. As time went on, more computers became connected and began to form a web of connections. Tim Berners-Lee had the idea to use this web to link all the information stored on computers. Thus, the internet was formed, and new opportunities for sharing information become possible. The first…

    • 1056 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Local Network Area

    • 15891 Words
    • 64 Pages

    L ocal area n e t w ork (L AN) communicat io ns s ecurity is address ed…

    • 15891 Words
    • 64 Pages
    Satisfactory Essays