Premium Essay

Wi-Fi Security

In:

Submitted By Imtired
Words 584
Pages 3
Wi-Fi is growing rapidly in mainstream America.
It seems that everywhere I go, there is a sign posted

offering "free Wi-Fi". Are these so-called

"hotspots", as secure as they are handy? Or, are hackers

somewhere lingering waiting to take advantage of some

unsuspecting user. Although wireless networks are

convenient, they may not necessarily be secure.

I use Wi-Fi at home and it seems to work for

my family and me. My main concern when it was

purchased was speed. However, now that time has progressed,

I have become quite concerned about its security. Through

further research, I found that I some experts suggested that

Wi-Fi is safe, secure, and needs only normal security settings.

While some experts say that Wi-Fi poses great risks to one's

internet security.

A wireless network functions by sending information

through radio waves. This makes it easier for someone to

intercept. Piraters do not have to be near you to pick

up and intercept a signal. One way I have found that this

is often done is on wireless peer-to-peer networks. Which

is mainly at those ever so convenient public hotspots. Frequent use of public hotspots promote very high security

risks for PCs as well as personal information stored on the

PC. Constant precautions have to be maintained when using

a wireless connection. To start, a strong password comes

highly recommended. As well as constant up keep on your

security software. Don't have a default wireless

connection site setup on your laptop or PC. Do not use

peer-to-peer wireless connections. Always disable your

wireless connection when you are not using it. Keep your

firewalls enabled.

Wi-Fi has its rewards. It is inexpensive

and easy to hook up. Public hot spots are easily

Similar Documents

Free Essay

Wifi

...Wi-FiFrom Wikipedia, the free encyclopediaJump to: navigation, search For the radio station, see WIFI (AM). Wi-Fi logoWi-Fi ( /ˈwaɪfaɪ/, also spelled Wifi or WiFi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. "Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark. Wi-Fi has had a checkered security...

Words: 2476 - Pages: 10

Premium Essay

Future of Wifi

...Wireless Fidelity, or Wi-Fi, exploding in popularity, companies and even some whole localities are increasingly providing access to the public. Due to its popularity, varieties of businesses are exploring their options to stay relevant and attract customers. Airports, train stations, grocery stores and other public locations are offering free Wi-Fi in hopes to lure the consumer to purchase their products. Free public Wi-Fi facilitates a lengthier customer relationship and offers a competitive advantage against other local coffee shops offering the same consumables. The accessibility that retail companies have offered to their customers allows for easy and convenient access to the internet. Background Information Wi-Fi is radio-wave technology known as IEEE 802.11b. Wi-Fi has an inexpensive installation and runs with speeds up to 11Mbps. An existing local area network, LAN, needs to exist to install wireless access points. The advantages are the mobility it allows, ability for multiple devices to quickly access with or without authenticating, higher speeds than wired access, and installation costs. The disadvantages include the need for multiple wireless access points to increase signal strength in large areas, narrow area of space that the wireless signal reaches, connection hiccups and the weak security points of having a public network. There is currently minimal security offered directly by the internet provider. Literature Findings Current State Wi-Fi is still currently...

Words: 1788 - Pages: 8

Premium Essay

Test

...SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING Securing Wi-Fi Rogue Access within an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the...

Words: 18577 - Pages: 75

Premium Essay

Security Evaluation Report

...Information Security Article Evaluation Nelson Okubasu CMGT/441 12/3/2014 MARJORIE MARQUE Can We Sniff WI-Fi?: Implications of Joffe v. Google Google collected information between 2007 and 2010 both in us and oversees. In 2010 a law suit was filed against google for violating the federal wiretap act. Among the first of the cases to rule on intercepting unsecured Wi-Fi communications. As of today our society has become so dependent on using Wi-Fi communications for various aspects of our lives, there is a parallel expectation of privacy. At the same time there are so many people or users out there who don’t understand how Wi-Fi technology works, if their information is secure, whether there privacy is violated or if the government has the right law in place to protect them. The fact that users do not fully understand Wi-Fi technology and the shortcomings of current security mechanisms is not a justification to violate their privacy, but instead to call on the government to enact or amend the Federal Wiretap Act (FWA) to reflect their reasonable expectations. Clear statutory protections will allow for the continued progression of Wi-Fi technology. Society’s dependency on Wi-Fi networks and public hotspots both economically and personally requires expansion of the FWA to ensure national uniformity. Essentially, the court found that even though Wi-Fi networks do transmit data using radio waves, the uses of Wi-Fi technology...

Words: 1058 - Pages: 5

Free Essay

Wifi

...Wi-Fi ( /ˈwaɪfaɪ/, also spelled Wifi or WiFi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. "Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark. Wi-Fi has had a checkered security history. Its earliest encryption system, WEP, proved easy to break. Much higher quality protocols, WPA and WPA2, were...

Words: 325 - Pages: 2

Free Essay

Information Systems

...Information Systems Name: Institution: Course: Date: Issue Specific Security Policy Title: Responsible and Good Use of Wi-Fi Technology Classification: For Internal Use Only Statement of Policy This security policy document is about fair and responsible use of Apple Inc’s Wi-Fi technologies. It cover’s but is not limited protocols, software and hardware associated with Wi-Fi. It is meant for authorized users in Apple Inc. Allowed users are defined as anyone who has been allowed approval to access Apple Inc information and systems. This can be employees and other workers. Appropriate Use Portable gadgets users are permitted, with earlier management approval to use Apple Inc’s internal Wi-Fi. The Wi-Fi should be put to use only when in the perimeter of Apple Inc’s premises. Systems Management It is the responsibility of the Wi-Fi manager, for Apple Inc to make sure all Access Points are set up with proper settings as stated by the Wi-Fi System-Specific Policy. Violations of Policy Incase of inappropriate use of Wi-Fi technologies, Apple Inc reserves the right to take any steps that are deemed appropriate for the situation Policy Review and Modification This policy will be reviewed by Apple Inc Information Security on an yearly basis and as necessitated by change in the technology, and modified where it is deemed appropriate by the management of Apple Inc. Limitations of Liability ...

Words: 370 - Pages: 2

Free Essay

Party Paltes

...incorporate the use of Wi-Fi and laptops into our business. Incorporating Wi-Fi and laptops into our business will enable employees, vendors, and upper management to work faster and be more efficient. Wi-Fi is the method for wirelessly connecting to the internet. Wi-Fi can be used in our departments along with laptop computers to take orders, track inventory, or process orders without being tied to a desk computer. The laptops can be moved around in the building and will still have access to the internet. Upper level management can also benefit by having the wireless connection anywhere in the building. The pros Party Plates will run a much more efficient, competitive, and organized business by utilizing laptops and Wi-Fi in our organization. Laptops offer employees a chance to take the office with them wherever they may go. Benefits of laptops in meetings are: effective way to take and save notes, the ability to access a file instantly, login to the corporate intranet and instant message a question to another employee. Laptops present employees mobility and organization that desktops cannot reciprocate. Wi-Fi allows employees to access the web anywhere, allowing for instant access whenever it is needed. This service isn’t only beneficial to employees but also to vendors and clients. By providing Wi-Fi access we enable...

Words: 775 - Pages: 4

Premium Essay

Lcd Display

...Gi-Fi :The Next Generation Wireless Technology Vipin kumar1, Pravesh Kumar2, Ravi Kumar Yadav 3, Pravin Kumar4 1,2,3 Department Of Computer Science &Engg. Uttarakhand Technical University, Dehradun 4 Dpartment of Information Technology Campus CCS University, Meerut 1 2 panwar.rke@gmail.com praveshkumar160@gmail.com 3 ravijoin88@gmail.com 4 pravinpanwar.ccs@gmail.com Abstract---Wireless technology improvement has become follower in today’s modern life. One of the greatest improvements made on wireless technology field was inventing a new Wireless Technology (Gi-Fi). Gi-Fi or Gigabit Wireless is the world’s first transceiver integrated on a single chip that operates at 60GHz on the CMOS process. Gi-Fi is a wireless transmission system which is ten times faster than Wi-Fi and it’s chip delivers short-range multi-gigabit data transfer in an indoor environment. It will allow wireless transfer of audio and video data up to 5 gigabits per second, low power consumption, usually within a range of 10 meters .This technology providing low-cost, high broadband access, with very high speed large files exchange within seconds. It is required that Gi-Fi to be the preferred next generation wireless technology used in home and offices. Keywords – WI-FI; Wireless Technology; Gi-Fi; Gigabit wireless; Bluetooth I . INTRODUCTION Melbourne University researchers have achieved up to 5Gbps data transfer rates on a wireless chip. This is a lot faster than any current Wi-Fi...

Words: 1846 - Pages: 8

Premium Essay

Evil Twin

...Evil Twin Wi-Fi Attacks NT1110: Computer Structure and Logic October 23, 2013 Abstract What is the “Evil Twin”? Evil Twin is a type of Wi-Fi attack, it is a home-made wireless access point that masquerades as a legitimate hot spot with a very strong signal in efforts to gather personal or corporate information. With this, the overall goal of this report is to educate the public on how to protect themselves. Additionally in this disadvantages and advantages will be discussed along with the effects on consumers and the future. According to Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield University, said: this is how the evil twin works. "So-called 'evil twin' hotspots present a hidden danger for Web users. In essence, users think they've logged on to a wireless hotspot connection when in fact they've been tricked to connect to the attacker's unauthorized base station. The latter jams the connection to a legitimate base station by sending a stronger signal within close proximity to the wireless client -- thereby turning itself into an 'evil twin. Cybercriminals don't have to be that clever to carry out such an attack. Because wireless networks are based on radio signals they can be easily detected by unauthorized users tuning into the same frequency." The Disadvantage of Evil Twins The Evil Twins a Menace to Wireless Security > Mobile, (by Jack M German Tech News World 06/04/09). Once the wireless...

Words: 1288 - Pages: 6

Free Essay

Can Research Rescue the Red Cross

...AT&T Headquartered in Oakton, VA, AT&T Government Solutions is a long-standing, trusted source of information technology solutions for the federal government, integrating unmatched network resources and IT managed solutions expertise with innovative technologies from AT&T Labs and a complementary team of industry-leading technology companies. Best known for network leadership in voice, data, video, and managed services, AT&T is a proven solutions integrator, with professional service expertise in enterprise architecture, business transformation, knowledge management, training, program management, systems engineering and security. More than 4,000 scientists, engineers and analysts – many with security clearances – focus exclusively on the IT requirements of government, with support from tens of thousands of professionals throughout the AT&T family of companies. Externally evaluated as a Software Engineering Institute - Capability Maturity Model Integration (SEI-CMMI) Level-3 organization and an International Organization for Standardization (ISO) 9001:2008, AT&T has the proven processes and procedures in place to deliver on time, on budget, with quality service. 1. Leadership Enterprise Management solutions from AT&T are designed to optimize the efficiency and availability of network services and mission applications. Enterprise Management process tools, implemented throughout your IT organization, can help your agency: * Increase automation...

Words: 3651 - Pages: 15

Free Essay

Foundation of It

...twentieth century and the beginning of twenty-first century has marked a great advancing period in technological world, especially Internet. Internet has allowed users around the world to communicate with each other very quick and fast. And with the development of Wi-Fi, these communication methods have been even more available. But Wi-Fi also brings its disadvantages with it since potential hackers can access the network faster than wired networks. In this research paper, our team has put forward a goal to observe and find information about the communications ways through the internet and how to improve the security of a wireless network. During our research our team members carefully researched and practiced all those communication methods. Our goal was to evaluate the best ways of communication. Our team members have also learned the threats that could affect Wi-Fi. Our next goal was to prevent all of those threats, to find security measures and evaluate which security measure would work the best. In order to experiment the Wi-Fi and its security we have taken a hotel in Djizak City, Afrosiyob Hotel, which has been opened in July, 2012 and does not have Wi-Fi system. We will implement a Wi-Fi network and we will suggest security measures for the network and propose our plan to the owner, Mr. Jahon Isakov. Introduction Since the invention of Internet, it has had numerous uses, from data analysis to communication, from...

Words: 2429 - Pages: 10

Free Essay

Who Will Cry When You Die

...TECHNOLOGY UNDER THE GUIDENCE OF:- PROF. SANCHITA GHATAK SUBMMITED BY:- ABHINAV KUMAR AKSHAY KUMAR ANKIT KUMAR AVI SHANKAR Contents WI-FI 4 Introduction 4 The Wi-Fi Technology 4 Elements of a WI-FI Network 5 How a Wi-Fi Network Works 6 Wi-Fi Network Topologies 6 Wi-Fi Security Threats 8 Eavesdropping 8 Man-in-the-middle attacks 8 Denial of Service 9 Wi-Fi Applications 9 Advantages 9 Limitations 9 Bluetooth 10 Introduction 10 Applications 10 Advantages 12 Disadvantages 12 ZigBee 13 INTRODUCTION 13 Working of zigbee 13 Network Devices of Zig Bee Technology: 14 Zig bee Coordinator: 15 Zig bee Router: 15 Zig bee End Device: 15 Wimax 16 INTRODUCTION 16 Advantages Of Wimax Technology 16 Disadvantages of Wimax Technology 17 Practical Usage of WiMAX 17 CONCLUSION 18 TABLE OF FIGURES…………………………… Figure 1 7 Figure 2 7 Figure 3 8 Figure 4 11 Figure 5 14 WI-FI Introduction Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network. The Wi-Fi Technology Wi-Fi Networks use Radio Technologies to transmit & receive data at high speed: 1)IEEE 802.11b Appear in late 1999 Operates at 2.4GHz radio...

Words: 2155 - Pages: 9

Free Essay

Wireless Networking

...wireless technologies such as hardware requirements and security measures needed to ensure a secure network. Wireless network trends are now offering new technology such as cloud computing and simply being able to work from anywhere you want. As you read on you will understand the benefits of wireless technology in our personal lives and in work situations. A Look at Wireless Networking Many organizations such as universities, retail centers and your own office depend on the ability to share information in an efficient and useful way. Nowadays networks are an integral part of almost every business and in your own personal life. There are two options for setting up a network — wired and wireless. A wired network uses cables to connect to a computer and a wireless network uses radio frequencies to connect to a computer. The components required to set up a wired or wireless network are somewhat similar with a wireless network needing a few additional pieces. Wireless networks are allowing individuals and businesses to become more mobile. For example, people are able to work from home these days and can have a better work-life balance. Businesses such as Starbucks, Tim Horton’s and McDonalds now all have free wireless access trying to add value to their customer’s experience. It is important to recognize that with all the benefits of wireless networks and the convenience they offer, there is always security and privacy risks to be taken into consideration. As this...

Words: 2645 - Pages: 11

Free Essay

Introduction to It

...David W. Dumond Introduction to IT (IT190-1502B-06) June 17, 2015 Individual Project(s) Contents Section 1: Information Systems Overview 3 Section 2: Information Systems Concepts 7 Section 3: Business Information Systems 11 Section 4: System Development 15 Section 5: Information Systems and Society 17 References 20 Section 1: Information Systems Overview The York County Sheriff’s Office is a law enforcement agency tasked with the regional enforcement of state criminal and motor vehicle statutes. The sheriff’s office also serves as the York County public safety answering point (PSAP). Calls for service are received at the PSAP and then dispatched via radio and computer terminal to law enforcement officers assigned to respond. Leading up to the use of Information Systems such as computer aided dispatch (CAD) the PSAP relied on radio’s to communicate information to the law enforcement officers. With the development of CAD and Record Management Systems (RMS) the sheriff’s office recognized the value of these systems and in 2007 adopted IMC CAD+RMS (Information Management Corporation CAD+RMS, 2007). IMC is a multifaceted information dissemination system utilized by dispatchers in the PSAP, emergency responders and their records management departments. IMC utilizes a closed stand-alone network and was developed for emergency management services such as fire, rescue and law enforcement departments. It is expandable and can be provisioned based on the client’s...

Words: 4524 - Pages: 19

Premium Essay

Internet Privacy

...not allowed these companies to take my information and sell it. These company sites guarantee that my information is protected. I do not open e-mails from unknown senders and I do not go to questionable sites. I have security measures in place on my computer; firewalls and antivirus software that I update regularly. My administrative laptop that I use at work is for work related e-mails and Internet use only. My expectations for Internet privacy on-the-job are strictly work related. I know that I do not go outside of the parameters, so there is no problem. I know that my email account for work is protected, as I work, indirectly, for a government agency. I do not use library computers or go to Wi-Fi zones, but if I did, I would know to be careful and only access sites that I know are secure. I also would not be free with my personal information. I personally, do not trust using these public computers. I have used the computers at the campus and know that there are high security measures in place to protect my personal information. Accessing my neighbor’s Wi-Fi may not be illegal, depending on where I live. Some states and cities find this to be illegal, whereas others have not addressed this issue. It may be illegal to share a neighbor’s Wi-Fi even with the neighbor’s permission. My Internet service provider had us...

Words: 402 - Pages: 2