Question

In: Computer Science

Why is security so important to wireless networks? Give two examples of defense measures that should...

Why is security so important to wireless networks? Give two examples of defense measures that should be taken to enhance wireless security.

Solutions

Expert Solution

Ans.:

The wireless network uses the frequency waves as a medium of communication. Also, most of the devices in today's period are connected to each other through this medium. This makes the devices open to data breaches and infiltration. The most common types of attacks that occur on wireless networks are Denial of Service (DoS), Masquerade, Release or modification of messages, Man in the middle attacks, etc.. These types of attacks occur without any signs and are hidden until victim notices the data breach in his system. Protection from these types of attacks make Security of prime importance.

In order to enhance the wireless security, there are many defence measure present to encrypt the information.

Measures like RSA, SHA256, Symmetric Cryptography, Diffie Hellman Key Exchange, Intrusion Detection System, Intrusion Prevention System, etc. are present.

Intrusion Detection system is a defencive measure as it works on detecting the presence of intruders in the network.This system alerts the system whenever there is intruder detected in the system. This makes sure that there is tight defence on the inside of network.

Intrusion Prevention System is one more defensive measure that prevents and takes appropriate measure against the intruder. This handles the defence on the boundary of the wireless network.

RSA algorithm is widely know for making sure that data transmission is secure and confidential. On the wireless network, the data transmission occurs in order for devices to complete the functions. Using the RSA algorithm to secure the transmission will greatly enhance the wireless security.

Diffie Hellman Key exchange is used to exchange the keys that are used to decipher the data being transmitted. This happens on the public channel. This mechanism will enhance the wireless security as the network is always public and is always availble to anyone connected to the network.

These are the examples that should be taken in order to enhance the security of the wireless network.


Related Solutions

1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
Why is the Fundamental Theorem of Calculus so important? Give examples on how the method of...
Why is the Fundamental Theorem of Calculus so important? Give examples on how the method of substitution works with definite integrals. What integrals lead to logarithms? Give some examples.
Describe, discuss, and give examples of transition management, why it is important, and when should it...
Describe, discuss, and give examples of transition management, why it is important, and when should it begin.
why health insurance is so important for women, infants and children. Give detail and examples
why health insurance is so important for women, infants and children. Give detail and examples
Why health insurance is so important for women, infants and children? Give detail and examples.
Why health insurance is so important for women, infants and children? Give detail and examples.    
1) Describe what a VLAN is and how it might be important with wireless networks.     ...
1) Describe what a VLAN is and how it might be important with wireless networks.      2) Explain why packet filtering alone is inadequate as the only form of firewall.      3) Describe the role of a DMZ when talking about perimeter firewalls.      4) Describe what a “Proxy Server” is and how it is used with firewalls.      5) Explain the role of a “personal “ firewall on a corporate network where there is a robust perimeter firewall.     ...
Secure VPN Configuration and Management & Wireless Network Defense Give me two pages of easy about...
Secure VPN Configuration and Management & Wireless Network Defense Give me two pages of easy about the topic.
4. What is ICMP and why is it important in data transferring? Give two examples of...
4. What is ICMP and why is it important in data transferring? Give two examples of its usage. Also, explain why ICMP messages cannot be considered reliable.
Determine why information security is so important in healthcare by analyzing at least two different types...
Determine why information security is so important in healthcare by analyzing at least two different types of safeguards for data and elaborate on what standards are looked at for each. Also, identify the types of facilities these safeguards can be used in and what are the expectations. Please try not to duplicate your classmates’ answers. There may be several different standards for each safeguard but you are required to mention at least two.
what is your opinion on this? Should companies use wireless technology for their networks? The use...
what is your opinion on this? Should companies use wireless technology for their networks? The use of wireless technology would be useful as it can promote cost-efficient measures as wireless networks are less expensive due to fewer cables being used and it’s extremely flexible because workers can still do work while away from the office. However, there’s more of a risk of being exposed to attacks, and speeds may be significantly slower than a wired network. What limits should be...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT