Discuss about the Threats To Wireless Networks And Countermeasures.
The wireless network provides present some advantages when it comes to improvement of the productivity of an organization as they will be able to access their resource data effectively (Choi, Robles, Hong & Kim, 2008). The aspect of the configurations within a network is much less difficult, quicker and less expensive. On the other hand, the wireless technology generates some threats which could alter on the pre-existing data risk profile for an organization. In this research it aims to explore more on the topic of wireless network. Some of the research questions which will be addressed are;
What is regarded as the wireless network?
How are the threats being addressed?
What are some of the countermeasures to the wireless network threats?
What are some of the technology which are used in wireless network?
This report examines the numerous threats that are associated to the wireless network. Furthermore, it will highlights on some of the countermeasures which are associated to the wireless network against those threats (Karygiannis & Owens, 2002).
There are numerous tools that are utilized when an individual is undertaking a research in relation to the wireless network security and the countermeasures (Malik, 2013). The research may utilize the scope of to the local area network tool for the purpose of use to the personal computers, switches as well as the access of the networks (Malik, 2013). Additionally, it would be significant to using applications for the communication within the local area network to have the ability to identify how these attacks could take place.
Some of the application for this technology is the IEE 802.15.4 which is a wireless technology that is gaining traction to the LPWAN group. The technology is used in the Mesh networks that allows the nodes to be connected together by multiple pathways (Kalita & Kar, 2009). Another is the Bluetooth and BLE which are wireless technologies which are used in transferring of the data especially over a short distance (Karygiannis & Owens, 2002). Other technologies are WiMax which is a wireless technology which allows data to be transferred at the rate of thirty to forty megabits per second.
Wireless networks are important because of their convenience, efficiency in regards to cost and ease especially in the integration with some of the other networks and network elements (Karlof & Wagner, 2003). The following are the threats which are associated to the wireless network.
This threat occurs when an attacker is able to connect to the network of the organization by penetrating the network by use of a laptop (Karygiannis & Owens, 2002). These laptops are known as the soft Access point (Sharma & Ghose, 2010). When the hacker is in a position to acquire the gain access to of the network they steal passwords or perhaps launch an attack to the wired network or perhaps place a Trojan application.
These are kind of network which are regarded to as the peer-to peer wireless computers and they usually do not have any access point between them (Karlof & Wagner, 2003). The network has little protection and it is easy to penetrate the network.
This kind of attack happens when the hacker is capable to listen to the traffic of the system after which identify a MAC address to the target computer that has the privileges of the networks. In most of the wireless system permits MAC to manage to filter the allowed authorized gain access to by use of the MAC ids and gain access and utilize the network.
In this kind of threat of wireless network the hacker utilizes an access point that are exposed to the non-filtered network such as the broadcasting of the traffic of the network for example the spanning tree, or the HSRP (Kalita & Kar, 2009). The attacker inject what is regarded as a bogus network reconfiguration commands which have an impact to the routers, intelligence of the hubs as well as the switches in the network (Kalita & Kar, 2009). When this has been done the attacker bring down all the network down. The only way to restore it would be through rebooting or even reprogramming of the intelligent network devices.
This threat occurs when there is unauthorized access to the wireless network of the organization which can take various methods. This usually happens when the user turns on their PC and it latches to a wireless access point from the neighboring overlapping network of the organization. This is a breach for an organization since their data may be compromised.
This threat occurs when an attacker is able to bombard an access point of a target network with the aid of a bogus request, commands or even a malfunction message. Such request could cause the legitimate users not to be able to access the network or even cause a crush to the network. The hacker usually depends on the neglect of the protocol for the network for instance the extensible Authentication protocol within the network.
The use of encryption: This is one of the most widely used way of securing of the wireless networks from the attacker. The network is usually encrypted to prevent unauthorized access to individuals who are not privileged to access it. Most of the wireless routers as well as the access point of the networks have an inbuilt mechanism to be able to encrypt the data. The manufactures delivery the wireless routers which have encryption capabilities but in most of the time they are usually turned off thus individuals who acquire it should turn on this encryption feature.
The firewalls usually block any unauthorized communication between both internal as well as external networks (Zia & Zomaya, 2006). An example of firewall which could be implemented is the packet-filtering firewalls. This firewall is implemented by configuring the router to filter packets which are going in both of the directions (Karygiannis & Owens, 2002). It usually works at the IP network layer. This firewall has the capability of filtering the IP packets which are based on fields such as the IP address, TCP source port as well as the destination of the IP address.
The manufacture of the wireless routers in most of the instances have them assigned a default passwords which enables the users to operate on them (Sharma & Ghose, 2010). The attackers most of the time know that the password are at default and could easily exploit on this and access the network (Yu, Li, Zhou & Li, 2012). It is vital to change them to something which no other person knows (Noor & Hassan, 2013). Moreover, the password should be complex and long so that it becomes hard for the attacker to crack it.
When it comes to the threat of identity threat it can be mitigated through combination of various software that allows the computers to enable the computers seem as if it is operating under a MAC address that an attacker desire and this would enable them to be hurdled in getting around this attack (Wu, Chen, Wu & Cardei, 2007).
When one is not using the network it is important to always turn it off. The attackers have no capability of accessing the wireless routers particularly when it is turned off (Raymond & Midkiff, 2008). Moreover, when one turns on the router it is vital to limit the access at any particular point which becomes susceptible to the hacker to penetrate it.
Many of the wireless routers have mechanism to what is regarded as the identifier broadcasting. This technology send out signal to devices that are near the area of access of the network (Pathan, Lee & Hong, 2006). The hackers may utilize the identifier which is broadcasting the wireless network and gain access to the system. It is vital to disable on any identifier that is broadcasting the wireless network.
The wireless network could offer numerous opportunities particularly to people as well as the organization to be able to increase the productivity. When it comes to the real life the wireless network has been able to impact it in a number of ways to the organizations as well as individuals. One of the benefits it has it is convenient, as well as cost effective. Moreover, it has provided integration especially incorporating with the other network which has become much easier. The PCs which are sold have a pre-equipped wireless network technology. The research has examined on some of the threats which are associated with the wireless networks along with the counter measures to these issue, I intend to use this information for my personal protecting against threat as well as educate other individuals who are not aware of the risks. The use of program such as anti-virus could be important to keep the network more secure. It is important to stay up to date with the latest technological upgrades to be able to keep the network secure.
From this discussion I have learnt various aspects, but the most significant of them all include there exists many threats in the wireless network and it is important for one to have an anti-virus which is up to date to protect the system from any attacker. Moreover, I have learnt that when buying the router it is important to pre-set the password as many attacker knows that many individuals do not know about that and can penetrate the network.
Conclusion
This aim of the research has been to discuss on the wireless network threats and their counter measures that one needs to use. Currently, there are majority of the wireless network which are used in home, as well as offices in many of the companies. Organizations as well as individuals utilizing them need to understand there has been an increase in number of threat associated to the wireless network and the hackers are stealing data every day. There is a need to be aware of the current threats posed and how to mitigate them without even the use of the professional experts. Knowing the basic counter measure would be the starting point to keep one system secure. Its vital for one to monitor on all their connections in the network and identify any unusual activity. Moreover, keeping of one’s system up to date with the latest antivirus program as well as patches would be most effective to keep the hackers from gaining an entry to the system.
References
Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security: Vulnerabilities, threats and countermeasures. International Journal of Multimedia and Ubiquitous Engineering, 3(3), 77-86.
Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN), 1(1), 1-10.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), 293-315.
Karygiannis, T., & Owens, L. (2002). Wireless network security. NIST special publication, 800, 48.
Malik, M. Y. (2013). An outline of security in wireless sensor networks: Threats,countermeasures and implementations. arXiv preprint arXiv:1301.3022.
Noor, M. M., & Hassan, W. H. (2013). Wireless networks: developments, threats and countermeasures. International Journal of Digital Information and Wireless Communications (IJDIWC), 3(1), 125-140.
Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006, February). Security in wireless sensor networks: issues and challenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference (Vol. 2, pp. 6-pp). IEEE.
Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1).
Sharma, K., & Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.
Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. Wireless network security, 103-135.
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and computer Applications, 35(3), 867-880.
Zia, T., & Zomaya, A. (2006, October). Security issues in wireless sensor networks. In Systems and Networks Communications, 2006. ICSNC’06. International Conference on (pp. 40- 40). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download