by
Chris Bradley
ITT Technical Institute Information Systems Security student
November 23, 2010
Dr. French:
This report on “Wireless Network Security” is submitted in accordance with your assignment for November 23, 2010.
Sincerely,
Chris Bradley
ABSTRACT
For this project, I asked the question “is wireless network protection truly safe?” My literature search led me to conclude that, if consumers use the most up-to-date and secure wireless network protection, they can connect to their wireless network and conduct business safely and confidently.
TABLE OF CONTENTS
Title Page ----------------------------------------------- i
Letter of Transmittal ------------------------------------ ii
Abstract ------------------------------------------------- iii
Table of Contents ---------------------------------------- iv
Statement of the Problem --------------------------------- 1
Methods -------------------------------------------------- 1
Results -------------------------------------------------- 2
Conclusions ---------------------------------------------- 2
Acknowledgements ----------------------------------------- 3
References ----------------------------------------------- 5
Appendix A ----------------------------------------------- 6
Appendix B ----------------------------------------------- 9
STATEMENT OF THE PROBLEM
Is wireless network protection truly safe? Can the average consumer feel comfortable trusting it? Technology is advancing at an alarming rate. Consumers are always looking for the most convenient ways to connect to their network and the Internet, and wireless networks are becoming more and more accepted and practical. Sensitive information, such as username/password combinations, Social Security numbers, bank accounts, etc, in the wrong hands could cause a consumer costly problems. While not 100% secure, using the most secure
References: Vakil, F. (2005). Wireless networks and security issues. Retrieved September 21, 2010, from American Library Association. (2005). Wireless network configuration and security strategies September 21, 2010, from http://web.ebscohost.com.proxy.itt-tech.edu/ehost/detail?vid=1&hid=111&sid=d467e3be-c81c-4a03-97e3-03ef864b3725%40sessionmgr111&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=f5h&AN=18501151. WPA Wireless Security for Home Networks. Retrieved on September 21, 2010, from http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx. Wired Equivalent Privacy. Retrieved on September 21, 2010, from http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy. (In)Security of the WEP algorithm. Retrieved on September 21, 2010, from http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html. 10 Tips for wireless home network security Securing your wireless network. Retrieved on September 21, 2010, from http://www.practicallynetworked.com/support/wireles s_secure.htm.