Preview

Assignment 1: How Safe Is Your Wireless Network?

Powerful Essays
Open Document
Open Document
3826 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 1: How Safe Is Your Wireless Network?
How safe is your wireless network?

Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices. Today, there are two ways that data can be transmitted. Either through a physical cable or through free space. There are a number of security considerations when using a physical cable. However, there are an even greater number of security considerations when transmitting through the free space.
…show more content…
These network technologies use radio waves to connect to networks. Today’s smartphones also can act as their own mobile hotspot. Other ways that mobile devices can connect wirelessly are by using public Wi-Fi hotspots. Home users tend to have a variety of devices they like to connect wirelessly to the internet and to each other. While at home, users can use a wireless router provided by their ISP or they buy a wireless router that can be connected to the home wired network to provide wireless functionality. Because of the high-price of smartphone hotspots use, few home users use their smartphone network to connect their other devices to the internet. Other ways that home users can connect wirelessly are through ISPs that provide satellite or microwave connections. Businesses are increasingly using mobile employees with mobile devices that connect to the company’s infrastructure wirelessly. When business employees are out and about they have many different options for connecting. They can use their smartphones, create a hotspot with their smartphone to connect other devices to the network or use public Wi-Fi

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    A cellular network or mobile network is a wireless network distributed over land areas called cells, each served by at least one fixed-location transceivers known as a cell site or base station. In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth with each cell.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Internet Access: Your wireless phone can also be your connection to the Internet, either with an internal browser or tethered to your computer, and available wherever there is cellular coverage. Wireless broadband is also available separate from your cellular account.…

    • 1068 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mobile and fixed networks are now both extremely developed in today’s modern world. It is now completely possible to get blazing fast internet with wither a fixed line provider, or a mobile provider. The services provide more than internet though, also frequently providing phone and/or television services. These networks are far from perfect though.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mobile hotspots (a.k.a. portable hotspot or portable hot spot) are portable devices or features on smartphones that provide wireless Internet access on many devices (your laptop, smartphone, MP3 player, tablet, portable gaming device,…

    • 1718 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In this currently changing data-thirsty world, people like to access the information regarding family, business, politics, education and social or professional networking in their day-to-day lives. Thus, As-mobile-as-possible wireless access to the internet, intranet or a corporate database.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wlan Security Threats

    • 373 Words
    • 2 Pages

    To prevent these threats from happening, you should follow the 802.11 core security standards, which provides protection between the wireless access point and the wireless host. This protection includes confidentiality, authentication, and message integrity. A drive-by hacker cannot intercept traffic to read it or send its own messages to the access points. But since this protection isn’t provided from end-to-end, you should also use 802.11i security protection, which uses extremely strong AES-CCMP encryption. It has a 128-bit key encryption and a key management method for automatically changing keys. It uses the strongest security algorithms, so it…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What risks and safeguards are associated with wireless communication? What is “war driving” or “war flying”? Are you comfortable (or would you use) a wireless “hot spot” to do computer work? What safeguards might you use in accessing an unprotected (public) wireless communications? Are you more at risk using a wireless connection via laptop or a connection via a smart phone?…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A device that can use Wi-Fi (such as a personal computer, video-game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. Cellular most often associated with wireless phones, a cellular network uses connected transmitters, or cells, that enable the user to move about while remaining in contact with the network. Cells transmit at low power levels so as not to interfere with each other and may be spaced far apart in rural areas or close together in cities. Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. WiMAX while over-the-air data is fast becoming the realm of cellular providers, dedicated wireless broadband systems also exist, offering fast Web surfing without connecting to cable or DSL. One well-known example of wireless broadband is WiMAX, offered by providers such as Clear or Skyriver. Although WiMAX can potentially deliver data rates of more than 30 megabits per second, providers offer average data rates of 6 Mbps and often deliver less, making the service significantly slower than hard-wired broadband. The actual data rates available to someone using WiMAX can vary widely with their distance from the transmitter. WiMAX is also known as one version of 4G wireless and has been available in phones as Sprint's 4G technology. However, the company has been building out a network using LTE, the 4G technology used by AT&T, Verizon and T-Mobile.…

    • 433 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IT/241 Wireless Security

    • 391 Words
    • 2 Pages

    With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person…

    • 391 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Wireless Security

    • 3376 Words
    • 14 Pages

    intruders. However, there is currently no wireless security implementation that everyone agrees is always suitable, regardless of what network it is to be used on. Some implementations are satisfactory for some environments, and there is work underway to create future solutions. Meanwhile, some wireless users make the situation more difficult as they advertise existing vulnerable networks.…

    • 3376 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Characterstics of Laptop

    • 1301 Words
    • 6 Pages

    d. Connectivity: A proliferation of Wi-Fi wireless networks and cellular broadband data services (HSDPA, EVDO and others) combined with a near-ubiquitous support by laptops means that a laptop can have easy Internet and local network connectivity while remaining mobile. Wi-Fi networks and laptop programs are especially widespread at university campuses.[…

    • 1301 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Mcomerce

    • 14247 Words
    • 57 Pages

    [26] [1] A. Helal, B. Haskell, J.L. Carter, R. Brice, D. Woelk, M. Rusinkiewicz, Any Time, Anywhere Computing; Mobile Computing Concepts and Technology, Kluwer Academic Publishers, 1999, June. [2] K. Tanaka, A set of transparencies about the Finnish-Japanese 3G project, Finpro Office, Tokyo, 2001. [3] K. Ichikawa, The View of NTT DoCoMo on the Further development of Wireless Internet. Tokyo Mobile Round Table Conference, May 2002 (CD). [4] New Media Review. Available from: , 2005 (accessed March 30). [5] MeT White Paper on Mobile Transactions, 22.1.2003. Available from:…

    • 14247 Words
    • 57 Pages
    Powerful Essays
  • Good Essays

    Mobile Computing Issues

    • 2189 Words
    • 18 Pages

    Introduction • There are several characteristics of wireless networks and mobile devices that give rise to issues that do not pose a problem in fixed, wired infrastructure. – Adaptive behaviour p – Battery power – Limitation on local resources – Small display size – Disparity in the availability of remote services – Unpredictable variation in QoS. Issues in Mobile Computing WRES3405 (3) 1 Adaptive Behaviour Effective use of smart space space. Invisibility. Localised scalability.…

    • 2189 Words
    • 18 Pages
    Good Essays
  • Powerful Essays

    High demand for advanced technology, from both businesses and consumers, has resulted in the rapid advancement of mobile telecommunications. Society’s dependence upon cell phones has grown immensely since their popularity began over a decade ago. In the past five years, the demand for more sophisticated mobile equipment has resulted in the discovery of hundreds of potential uses for cell phones. One such use, that has created an un-tethered freedom from home PC’s, is the introduction of mobile web browsing. Not only have cell phone browsers advanced recently, so have the data connections that these devices use to connect to the internet.…

    • 1969 Words
    • 8 Pages
    Powerful Essays

Related Topics