Preview

Wireless Security and Threats

Powerful Essays
Open Document
Open Document
948 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Security and Threats
University Of Lahore (UOL)

TERM PAPER
WIRELESS SECURITY AND THREATS
Summery of 15 Research Papers

Submitted to:
Natash Ali Mian
Submitted by:
Syed Usman Saleem
Roll No: MCS01111022
MS(cs)1st
Muhammad Imran Tariq
Roll No: MCS01111001
MS(cs)1st

1. Introduction. In this tram paper we try to focus on wireless security and threats. Now a day wireless networking is get fame day by day and mostly user prefer or like wireless network because it easy to use. WLAN wireless local area network popularity gained is due to many reasons such as ease of installation flexibility mobility reduced cost of ownership and scalability.
2. Security and privacy issues in Wireless Network. The problem of WEP protocol where wireless network using WEP is secure but restricted meaning that people need to know a secret key in order to connect to the network. The WEP security flaws and access the progress made towards replacing WEP. Wired networks are prone to the same attacks as wireless ones including sniffing spoofing and Man in the middle attacks MITM. WLAN needs a mechanism to counter this threat.
3. Problems and vulnerabilities in Wireless Network. Typically a WLAN operates in the same fashion as a wired LAN except that data is transported through a wireless medium rather than cables. The following sections describe common threats that WLANs are faced with and some countermeasures that can be employed to protect against such threats. Eavesdropping unauthorized access Physical threats Interference and jamming

4. Attacks at Wireless Network. As WEP has been shown to be vulnerable to multiple attacks, a huge effort has been placed on specifying an access control mechanism to be used in wireless installations. However, properties of the wireless environment have been exploited to perform multiple attacks against current solutions, such as 802.11/802.1X. These attacks include the denial of service attacks, the man in the middle attacks and the

You May Also Find These Documents Helpful

  • Best Essays

    IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std. 802.1X (2004).…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When running any type of network you need to have security in place to keep threats out. I would like to start with the WLAN by using a WPA2 which will encrypt the network with a 256 bit key that would be required to log into the network. Risk of running a WLAN is higher because of the threats of hackers that may try to crack the system. This is why using a WPA2 is better because of the long key lengths to improve security. Employees of Kudler fine Foods should not be given the…

    • 502 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    Need to prevent eavesdropping on WLAN due to costumer privacy data access: protect against monitoring software, know what devices are present on your network and their software, and use encryption.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Check Understanding

    • 1457 Words
    • 6 Pages

    1. Fill in IEEE 802.11 B, 802.11 G, 802.11 A, or 802.11 and in the blank to match the description.…

    • 1457 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    To prevent these threats from happening, you should follow the 802.11 core security standards, which provides protection between the wireless access point and the wireless host. This protection includes confidentiality, authentication, and message integrity. A drive-by hacker cannot intercept traffic to read it or send its own messages to the access points. But since this protection isn’t provided from end-to-end, you should also use 802.11i security protection, which uses extremely strong AES-CCMP encryption. It has a 128-bit key encryption and a key management method for automatically changing keys. It uses the strongest security algorithms, so it…

    • 373 Words
    • 2 Pages
    Satisfactory Essays