Tuesday, June 4, 2019

Wireless Networks Security Privacy And Ethical Issues Computer Science Essay

Wireless Networks Security Privacy And Ethical Issues Computer Science quizWireless ara profitss (WLANS) befool been increased drastically increased in every area such as educational institutions, homes public areas and businesses piano tuner base on the standard 802.11 are mostly used in the corporate and environment such as 802.11b operates at 2.4GHZ and gives up to 11mbps and 802.11a gives up to 54MBPS. In this composing I am going to discus about the wireless network security and privacy issues and the solutionsThe 802.11 standard includes some implements to give the security of the transmitted data. So many papers have already written about that the mechanisms available are insufficient to provide the securityThe main problem always with wireless security is the no control on the communication mean(a). Radio waves do non care where the gracefulty lines are drawn. When comes to wired network it uses the physical medium like copper and fiber optic cables these can be m uch more easier to stop the attacks on the cables. Wireless networks are become more ordinary in the last decade. Big companys and general end drug substance ab exploiters also using every day because of the local wireless networks user mobility, simple and fast installation, scalability and mild price. Wireless local area network enable the users to access the network with in the range of the network coverage without any wired network. Data transferred using the radio waves through the post any user can access these using a radio receiver. Since there is a problem of the protection of the data. So the mechanisms which can be applied for security for a wired network cannot be applied to wireless networks. It is compulsory there should be a mechanism which can be able to protect and give some privacyDay by day the numbers of applications that can be die harded by the wireless technology are increasing. People can access the mesh from any public area such as cafes, airports, ho tels etc. There are some privacy issues are concern when comes to the public hotpots that are ex if suppose a customer want to create an account on a website he has to give the name and some other personal details as any of the above mentioned attacks may give a chance to cross these details to aggressors .networks and information about the protocols which are used in the network because different protocols provides the different security proceedss so leaking the protocol information may cause big problem to the networkEavesdropping is technique which is used to tack the UN-encrypted wireless sessions from which the data can be extracted and that is used for the dangerous sweets and another kind of the eavesdropping is k straight offn that the attacker injects the packets in the network packets in the network this kind of attacks happens in the encrypted networks. An attacker injects the packets and receives the packet in the reverse to understand the encryption techniques and give the networkThe above mentioned attacks are mainly affected the networks but not the specific users. Once an attacker get access the network then attacker starts another type of threats starts to accessing the network devices but sometimes the privileges given to the resources in the network prevents the attackers to access the resourcesAnother type of attack is that the interference the sessions and after that it does not allow the station to reestablish connection with access point. Than the attacker establishes connection with access point. flat there are two connections between the AP and the two workstations now the attacker workstation can access the communication between the end user and the access pointConfidentiality is the property of the data in general security is unavoidable for the most of the organizations. wireless is the broadcast network to maintain Confidentiality it is not an easy thing today so many packet analyzers available in the internet which are comm only used to braking the network for example a access point transmitting the 3000 bytes at 11mbps will take 24 bit space after approximately 10hours5Ethical issues with WIFI NetworksWhen comes to the open network which offers free network connections to browse or download etc and using the GPS devices there is no any legal rules are defined to protect the privacy however node scanning is not illegal according to the US rules but when comes to the robbing the service or attacking the services and robbing the information. When comes to the node scanning is the issue of the location of the person or Access point. it may also gives the issues of the location privacy of the user or the location of an access pointIn general breaching the accespoints are used to do the following thingsTo access the Adult websites or to inject computer virus in the networkTo grab the bank accounts and the currency theftTo get the experience of the hackingRecently many studies as shown by setting up iterat e access points to learn about the scanning on an average 3 to 4 attempts per day tried to access the duplicate access points and recently a experiment in London shown that two friends are trying to rob the credit plug-in details of the customers of the store those were caught after stealing many card numbersUnauthorized access is causes the ethical problems ex there is no regulations to act on a person who log onto anothers computer an open network this case has occurred in 2004 in US . accessing the other network or resources without the permission is comes under robbing if suppose using the someone else network bandwidth means the proprietor of the network no longer can use the full bandwidth which is allocated to him its also comes under the stealing. Gamming thefts like that it uses the more bandwidth than any other applications peck pay money for their network connections. Some people can do anything to access the network. Day by day people are getting aware of the problems with the open networks. Now a days owners of the network setting passwords and applying the security. Hackers still access the internet so there are number of tools to crack the passwords some websites has been developed to support hacker to provide the general or default passwords. There are some responsibilities on manufacturers a recent study shows that more than 75 % people dont configure the WPA security if providers are not warnings. Where this provides the high level security and the dynamic encryption provides the different encryption keysIn this paper I have taken the qualitative approach to write this paper. In 802.11 some authentication mechanisms available Shared key certificate In this approach authentication work is completed by the response to a challenge by the access point which is known as challenge and responseOpen system Authentication In this approach SSID is used for the Authentication if the SSID is known access can be grantedCentralized authentication In th is method a horde is used for the authentication if the node is authenticated then only it can access the networkConclusionproviding the security to wireless networks and giving the privacy to the user is an big task because proving the security in the wireless means threats in WIFI and wired together and the threats provided by the newly emerging technologies so with the proper risk assessment and the planning the network security is the good way to provide the security to the because when comes to the university the level of security is different and the offices and bank security of necessity are different so what come to say that the protocols which are developed by the organizations such as 802.11 will cover the every end user requirements so according to the requirement of the organization need to change the security policies an the open networks are always threat to end users because it is not possible to provide the security to the every end user only way to create the secur ity is giving the unique encryption methods to every user which is a touchy task . but open networks provides the grater opportunities to the user to connect all time

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.