Question

In: Computer Science

What is the current state of wireless security? What are the vulnerabilities? What are the threats?

What is the current state of wireless security? What are the vulnerabilities? What are the threats?

Solutions

Expert Solution

Wireless Security : Wireless Security is a mechanism which prevent the unauthorized access of data or user to computer using wireless network. It provide security to protect data from unauthorized data breaches or illegal acts.

There are mainly two types of Wireless Standards:

I) WEP:  WEP password can often be cracked with computer devices in very less time. So This standard
is more vulnerable. There are many software tools are also available
to cracked the password and That's why this is notoriously known as weak security standard.

II) WPA: The Wi-Fi Protected Access (WPA and WPA2) protocol implements the majority of the IEEE 802.11i standard,
specifying security mechanisms for wireless networks.

Vulnerabilites:

  1. Default WiFi routers. By default, wireless routers are shipped in an un-secured state. ...
  2. Rogue Access Points
  3. Wireless Zero Configuration
  4. Bluetooth exploits
  5. WEP Weaknesses
  6. Clear Text Encryption Passwords
  7. Malicious Code

Threats of wireless system:

There are some modes of unauthorized access of wireless system that given below;

i) Denial of Services: In this mode hacker continuously bombard bogus request, premature successful connection message etc.

ii) Man in middle attack: Man in the middle attack basically  a perpetrator positions himself in a conversation between a user and an application. These attack are  enhanced by software such as LANjack and AirJack.

iii) MAC Spoofing: MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device

iv) Ad hoc networks: It is improvised device to device network attack. This kind of attack is very dangerous for any computer network organization.


Related Solutions

What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What...
What types of threats do smartphones face? Are there any particular vulnerabilities to mobile devices What qualities of apps make them a vulnerable security point in smartphone use Are apps more or less likely to be subject to threats than traditional P C software programs?
- What are the Windows Server threats and the security control?
- What are the Windows Server threats and the security control?
Discuss economic threats to security and how the threats are being addressed.
Discuss economic threats to security and how the threats are being addressed.
Discuss environmental threats to security and how are the threats being addressed.
Discuss environmental threats to security and how are the threats being addressed.
12. What is the swiss cheese model for security? Explain to your employees the risks of quality vulnerabilities.
Congratulations! You are the CEO of GE. GE company culture is all about quality and process improvement!You are leading a company meeting where you need to convince and inspire your employees that Quality Systems will be the tools to market your Brand and skyrocket your revenue.12. What is the swiss cheese model for security? Explain to your employees the risks of quality vulnerabilities.13. What is the Domino effect? Explain to your employees how one quality issue escalates to several company...
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
Wireless Security Systems Earlier in the course, you reported on wireless behaviors and antennas and conducted...
Wireless Security Systems Earlier in the course, you reported on wireless behaviors and antennas and conducted your own site survey for UTU. In this unit, you will research and report to UTU on wireless security systems and potential risk factors specific to college campuses. What do I have to do? Please address the following items: Using the Internet, research wireless intrusion prevention systems and vendors that supply such systems. Choose 2–3 vendors to recommend to UTU and write a brief...
What are Meltdown & Spectre? What are their security implication? What are the impacts of Meltdown & Spectre on the wireless networks?
What are Meltdown & Spectre? What are their security implication?What are the impacts of Meltdown & Spectre on the wireless networks?
Share your thoughts on the current state of the Social Security system. What would your recommendation...
Share your thoughts on the current state of the Social Security system. What would your recommendation be to the President about how to resolve the challenges we are facing with Social Security?
What are factors in HIT that precipitate security threats and how will you, in your practice,...
What are factors in HIT that precipitate security threats and how will you, in your practice, protect your patients from these same threats?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT