Welcome to YLOAN.COM
yloan.com » wireless » Security Issues In Wireless Networks
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Security Issues In Wireless Networks

Wireless communication/networks provide an advantage of mobility over wired networks

. Users can connect with the server of the organization with frequency links of electro-magnetic waves. Since such networks rely on EM waves, it enhances their serving capacity with the mobility feature.

Wireless networks are physically exposed, so the chances of intrusion in these networks are also high. The number of access points is high in wireless networks than traditional wired ones, so attackers keep scanning for those open points to enter the network and disrupt the working.

Some security issues or threats in wireless networks, affecting businesses are:

Creating Rouge access points: Rouge access points are created within the range of existing wireless LAN. These create an illusion to a node of the network that rouge point is a part of the network and associates with such point. These are short duration attacks which are vulnerable for a short duration of time. Once the attacker associates itself with the physical port of companys network, they can extend the period of vulnerability.


Sniffing: Attackers or hackers use software called Sniffer, which allows them to scan the traffic and different access points in a location having many wireless networks. Sniffer helps them find an open unsecured network, which hackers use to latch themselves with.

Denial of Service: Its simple concept makes it a more renowned security issue in network technology. It needs not access any port or any location in the server of company. Attacker simply overwhelms the network of the company by sending large packets of data so as to slow down the processing capabilities of server. This forces the server to deny the service to be provided to the user. In wireless networks, this is achieved by interfering with the frequency of operation of any wireless network.

Bluesnarfing and bluejacking: Not only the conventional LANs but the Bluetooth are be used with the intention of data tampering and data theft. Bluejacking allows any unauthorized device to send messages to the device, which could be malicious in nature. Bluesnarfers can steal the data from the device. The most dangerous part of this technique is it cannot be traced if some bluesnarfer steals data from the device.


Elvin twin: This threat creates a replica of the authorized host at attackers point. The authorized access point is blocked by the attacker and user is redirected via another access point under the authority of the attacker. This allows the attacker to control and analyze all the traffic from the user, including the keystrokes.

War driver: Only a wireless device such as a laptop or PDA is required to attack some network. The device then roams around the network and locks-on with the unprotected wireless network. Hacker then records all the information ids, the physical address of the network etc. and uploads them on an online database. This directs all intruders to the unsecured address and creates a chaos in the wireless network.

Wireless network provides the ease of being present only in the close proximity to the attackers rather than being physically connected with the network. This enhances the chances of attacks and intrusion in a wireless network, thus compromising privacy of the users. There are various information and software security essentials that should be taken care of. These processes are incorporated in the whole development procedure of any organization providing offshore software development services.

by: james.kevin69
Making Wireless Device Supervision More Practical Sierra Wireless Intros Dual-carrier Hspa+ / 4g Lte Aircard 754s-unlocked Wireless Technology Advancements People Could Get A Wireless Tower Inside Their Property If They Prefer The Connection Of Net How You Can Hook Up An Office Wireless System Tips On How To Choose A Wireless Bluetooth Headphone Engineers Unveil Two-way Wireless Breakthrough (engineering Colleges Tamil Nadu - Phys) Make Things Possible With Configurar Mikrotik Wireless 28.8m Huawei B683 Wireless Router A Wireless Cctv Camera System Huawei E968 Is Coming To Offer Superior Wireless Network Understanding The Technical Jargon To Find The Best Wireless Router Wireless Device Administration: Mobile Phone Handsets
print
www.yloan.com guest:  register | login | search IP(18.222.182.107) Noord-Holland / Amsterdam Processed in 0.012758 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 20 , 3832, 514,
Security Issues In Wireless Networks Amsterdam