Week 7 Research Paper - Wireless Security Vulnerabilities...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Wireless Security Vulnerabilities Exposed Macgyver Duarte 1 Wireless Security Vulnerabilities Exposed Macgyver D. Duarte November 20, 2015 ISSC Wireless Networks – Prof George Mikulski American Military University
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Wireless Security Vulnerabilities Exposed Macgyver Duarte 2 The area I decided to research is “Wireless Security Vulnerabilities Exposed”. Since wireless networks are becoming more popular, it’s important to stress wireless security and make sure people are aware of not only how to improve your wireless security, but the different types of threats, vulnerabilities, and attacks. A wireless network consists of four basic components, each of which provides an opportunity to be attacked and compromise your network. There are five wireless threats that people may not know about. It is important to know the basics of what kind of attacks are out there, if you are more aware, there is a better chance you can prevent an attack on yourself. There are also types of wireless attacks with each type having specific attacks listed. Those types are: Access Control Attacks, Confidentiality Attacks, Integrity Attacks, Authentication Attacks, and Availability Attacks. Having a business or a home network is not much different, except a business may have more personal information on more than one person. You can find tips on improving your wireless network on the Cisco Systems Inc webpage. They list five ways to improve your wireless security, which leans more towards a business wireless network. Heimdal Security lists 10 steps to maximize your home wireless network security. Future trends are hard to predict because technology is constantly changing. Everyone is coming out with new ways to hack security protocols, and the companies are coming out with new ways to prevent being hacked. Wireless networks are everywhere now; almost everyone has a device in which some way, they can connect to a wireless network. Your cellphone connects wirelessly to provide you a signal, if you have no service signal, you can connect to a wireless internet connection to where you can still receive data. People are becoming more and more dependent on wireless technology, and that in turn allows someone to gain access to your information. People buy things online, they have social media accounts, and their bank has an application on their phone.
Image of page 2
Wireless Security Vulnerabilities Exposed Macgyver Duarte 3 Hackers can access a whole slew of information just by gaining access to your cellular device. Wireless networks are everywhere these days, if you can’t gain access to a service provider’s network, than you might have luck gaining access to WI-FI. “The wireless networks consist of four basic components: The transmission of data using radio frequencies; Access points that provide a connection to the organizational network and/or the Client devices (laptops, PDAs, etc.); and Users. Each of these components provides an avenue for attack that can result in the
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern