View the step-by-step solution to:

Running Head: Wireless Security 1 Wireless Security Robert Mines American Military University WEB 311 July 17, 2016 Wireless Security 2 I....

Assignment Instructions
  • Link for APA Style: http://owl.english.purdue.edu/owl/resource/560/01/
  • APUSOnlineLibraryPresentation.ppt: http://edgetest.apus.edu/access/content/group/science-and-technology-common/WEBD/WEBD311/APUSOnlineLibraryPresentation.ppt
  • Synthesis_of_Research_Paper_Assignment.pdf: http://edgetest.apus.edu/access/content/group/science-and-technology-common/WEBD/WEBD311/Synthesis_of_Research_Paper_Assignment.pdf
  • Paper Grading Rubric.docx: http://edgetest.apus.edu/access/content/group/science-and-technology-common/WEBD/WEBD311/Paper%20Grading%20Rubric.docx
  • Undergraduate+Forum+Rubric.docx: http://edgetest.apus.edu/access/content/group/science-and-technology-common/WEBD/WEBD311/Undergraduate%2BForum%2BRubric.docx

  

Instructions:Create and submit a rough draft of your research paper. Be sure to properly format your paper and include citations, using APA formatting guidelines.


As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages regarding a topic identified in the textbook or another topic relative to this course.


Please refer to the attachments above for research paper writing tips and resources. It is important that you follow those guidelines and site your references throughout your paper and at the end of the paper.



Running Head: Wireless Security 1 Wireless Security Robert Mines American Military University WEB 311 July 17, 2016
Background image of page 1
Wireless Security 2 I. INTRODUCTION Wireless security is described as the prevention of damage to computers or rather unauthorized access by the use of wireless networks. The use of wireless network requires connection of an internet “access point” by the utilization of a modem or a cable to a wireless router which then sends the signal through the air. There are two main types wireless security known as the Wired Equivalent Privacy (WEP) which is a weak security standard and the Wi-Fi Protected Access (WPA) which replaced the WEP to improve safety (Ding et al. 2012). The sole purpose of studying this topic is to understand better the issues regarding wireless security and how one can be able to use wireless security without creating the possibility of being hacked into since most of the hackers believe that they can easily break into wireless security. Also, it is also to equip us with knowledge on how to improve the use of wireless security when we are using it. a. Purpose Statement The sole purpose of studying this topic is to understand better the issues regarding wireless security and how one can be able to use wireless security without creating the possibility of being hacked into since most of the hackers believe that they can easily break into wireless security. Also, it is also to equip us with knowledge on how to improve the use of wireless security when we are using it (Wright & Cache, 2015). b. Statement of the Problem or Research Question WEP was designed to provide the same level of security as wired networks. However, WEP has many well-known security flaws, is difficult to configure, and is easily broken.
Background image of page 2
Show entire document
Running Head: WIRELESS SECURITY 1 Wireless Security Robert Mines American Military University
Background image of page 1
WIRELESS SECURITY 2 Wireless security is described as the prevention of damage to computers or rather unauthorized access by the use of wireless networks. The use of wireless network requires connection of an internet “access point” by the utilization of a modem or a cable to a wireless router which then sends the signal through the air. There are two main types wireless security known as the Wired Equivalent Privacy (WEP) which is a weak security standard and the Wi-Fi Protected Access (WPA) which replaced the WEP to improve safety (Ding et al. 2012). The sole purpose of studying this topic is to understand better the issues regarding wireless security and how one can be able to use wireless security without creating the possibility of being hacked into since most of the hackers believe that they can easily break into wireless security. Also, it is also to equip us with knowledge on how to improve the use of wireless security when we are using it ( Wright & Cache, 2015). Additionally, one should be concerned more with the issues of security breaches that have constantly increased which are being caused by rogue access points. Consequentially, the network is easily exposed to anyone who is within the range of the signals when a wireless router is plugged into an unsecured switch port. Similarly, when a wireless interface is added to a networked computer that is using an open USB port, there are high chances that they may be a breach of network security that grant access to unauthorized is hence accessing confidential information ( Liu et al. 2014). The importance of studying this topic is to enable us to understand that despite the fact that wireless security network can be easily breached; there are three main principle modes of securing a wireless network. One of the major ways is by configuring access restriction in the access points (Rhodes-Ousley, 2013). The configured restrictions include checks on Wireless Intrusion Prevention Systems, Mac address which is used in providing wireless LAN security in the network model. Secondly, is by having an open and unencrypted isolated wireless network
Background image of page 2
Show entire document
Sign up to view the entire interaction

Top Answer

The solution is... View the full answer

research paper security.docx

Cyber Security Research Paper: Concept, Threats, Vulnerabilities, Challenges And
Solutions Cyber Security Research Paper: Concept, Threats, Vulnerabilities, Challenges And
Solutions Students name:...

Sign up to view the full answer

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question
Ask a homework question - tutors are online