Free Articles  >>  Computers and internet >>  Page 848  >> 

Why Wireless Networks Are More Vulnerable Than Wired Networks

The reason why wireless networks are more vulnerable than wired networks is that because the data is transmitted through the broadcast radio technology that works on the same microwave radio band (2.4 gigahertz) as cordless phones, instead of a dedicated cable.

It is possible to be intercepted by hackers, especially if there is not a firewall installed because the networking transmissions are broadcast indiscriminately. Drive by hackers and casual intruders can pick up the radio signal 20 to 50 meters and as much as 500 meters if there is sensitive equipment. It is estimated that 30 percent of all wireless networks have already had a hacking attempt made, even though it is illegal.

Your wireless network can become contaminated with a virus, if another wireless computer taps into the network and has it, contaminating your server and the other computers on that network.

When wireless networks came out, they were more convenient and often a higher speed access than traditional wired networks. It soon became evident that they were easier to be compromised since multiple users were using the same broadcast signals. If a server is not secure, encrypted and firewall protected, it can cause data loss of confidential information and virus attacks that can make a system vulnerable to crashing.

Many government agencies are no longer using wireless networks because of the security issues. For most other usages, a wireless network is suitable, as long as it is firewall protected properly, but you may want to consider the additional security of a wired network, if you handle sensitive information.

The safest thing is to have an IT or network security audit done to evaluate the multiple computers on your network, whether wireless or wired, for security and firewall needs. Businesses that transmit data, store crucial customer information like credit cards and other confidential information need to be especially aware of the consequences, should the information fall into the wrong hands.

By having an IT security audit done on your system, you can discover any vulnerabilities and protect against them. Typically, they will do audits that involve external penetration tests and internal management tests to uncover any possible threats, intentional or by ignorance of protection on the part of users.

Not only can security be compromised through wireless networks that are not properly secured, but wired networks need to have proper security software and firewalls working on their server to assure protection, on an internal, physical basis.

An IT security audit will evaluate the environment of the server, whether wireless or wired and any weak links in the security including the physical location and access to the server and settings for anti-virus and firewall programs.

Wireless networks have gained in popularity due to the ease of installation, especially in older buildings and the cost is less to install than cabling a wired network. The chances of contamination of data, information loss and virus or hacking by intruders may not be worth the cost savings, due to the vulnerability of wireless systems.
About Author Derek Rogers :

Derek Rogers is a freelance writer who writes for a number of UK businesses. For information on Network Security, he recommends Network 24, a leading provider of UK network security solutions: <a href="" target="_blank"></a>

Article Source:
Article Url:

Article Added on Sunday, April 26, 2009
Other Articles by Derek Rogers

How to Protect Your Wireless Network
One of the best things about a wireless network, whether you are at home or at work is that you no longer have to watch out for trailing cables wherever you go. However this does come with its own associated risks, not least that a number of networks are completely unprotected, i.e. they donít need passwords or anything else for you to be able to hook up to that network. Pubs and restaurants, even fast food places like MacDonaldís, have what are known as wireless hotspots, that is to say they...

What Hardware is Needed For a Network
As youíre probably already aware there is more than one type of network that can be created; but if it is a network to a computer that you want to install and need to know what special hardware you need, read on. Firstly, if you want to get a wireless network hooked up you will need a wireless network card and a router. If you have internet access at the moment, the same cable that you currently use to feed the Internet through your computer will go into the router, and then there is another...

Virtual Private Networks and the Benefits
The benefits that come from using virtual private networks are endless, however; some of the major ones include speed, flexibility, privacy, financial viability, and customisability. All of which are important for any business application whether it is a large or small business. Any business that uses multiple computers is going to benefit from a VPN. Most virtual private networks are going to be broadband. This is where speed counts. A virtual private network is one that links between open...

What is the Relation With Data Communications and Networks
Data communications and networks make use of an approach that is totally focused on the Internet and was designed to tackle the issues of communicating system design. In order to get to the data communications and networks, a certain integrated approach is taken. The way that this is done is by an emphasis that will begin right at the top level of the obligations and will work downwards from there; while explaining just how the requirements are completed by the lower layers of the broadcasting...

How Secure is Your IT Network
Nowadays, just about all major businesses and corporations are powered by one or more IT networks and continuously serves as the life and blood of day to day business operations. Each of the units or nodes of the network are powered by computers and individuals that work together in their dedicated positions and fulfil their roles assigned. IT networks are so delicate since any disturbance in the network can either hinder or slow down the overall network performance to a certain degree. Not...

Professional Network Management How Can Your Business Benefit
Network management is exactly what it sounds like. Managing all the networks in your business regardless of type and making them work properly. This is a monumental task for anyone, not to mention large scale companies. Thatís why there are professionals to help you do all of this. Managing your own networks requires you to have your own IT department and this may cost you a lot of money. Okay there is no may about it; it will cost you a lot of money. There is a solution to this overwhelming...

How Do I Use Cat 5 Cabling
For those who are unsure as to what a Cat-5 cable is, it is a cable that is a twisted pair high signal integrity cable that is often referred to as a Cat5. There are many of these cables that are shielded but there are also some that are unshielded. The Category 5 cables have been out dated by the standard specifications of structured cabling for certain computer networks like Ethernet, and it is sometimes also used for other signals like ATM, voice services and token ring (the local area...

Is Your Network Hardware Reliable
When one is talking about networking hardware, what they are typically referring to is equipment facilitating the connection between a variety of individual computer monitors. In most cases this will include things like firewalls, routers, hubs, ISDN adapters, switches, network bridges, modems, gateways, network interface cards, access points, networking cables and other related hardware devices. Copper based Ethernet adapters are known to be one of the most popular types of networking...

How to Choose the Right Pay Monthly Phone Deal
Monthly contract mobile phones provide a very popular option. Offering great savings on calls, text and Internet costs as well as a free or reduced handset, they are the perfect choice for anybody who relies on their mobile for their day-to-day communication. But with so many individual packages available, what is the right pay monthly deal for you? First of all you need to determine is how you actually use your phone. For example, if you rarely make calls but text frequently, you might be...

Business Mobiles Available to You
The world of business mobiles has been increasing with the different types of voice and data communication products on the market today. With the revolution of wireless hotspots, and increased satellite and phone tower capabilities, it is possible for many business people to travel and have a totally mobile office. Some of the business mobiles services available may involve Blackberry installations, (BIS and BES), for the growing popularity of the Blackberry hand-held phone/computer...

Click here to see More Articles by Derek Rogers
Publishers / Webmasters
Article ID: 129581
DELINK URL from Authors Bio
REMOVE Article
Tell A Friend
Leave A Comment!
Download this article in PDF
Report Article!
Search through all the articles:

246 Users Online!!
Related Articles:
Latest Articles:
computers and internet >> Top 50 Articles on computers and internet
Category - >
Advertising Advice Affiliate Programs Automobiles
Be Your Own Mentor Careers Communication Consumers
CopyWriting Crime Domain Names DoT com Entrepreneur Corner
Ebooks Ecommerce Education Email
Entertainment Environment Family Finance And Business
Food & Drink Gardening Health & Fitness Hobbies
Home Business Home Improvement Humour House Holds
Internet And Computers Kiddos and Teens Legal Matters Mail Order
Management Marketing Marriage MetaPhysical
Motivational MultiMedia Multi Level Marketing NewsLetters
Pets Psychology Religion Parenting
Politics Sales Science Search Engine Optimization
Site Promotion Sports Technology Travel
Web Development Web Hosting WeightLoss Women's Corner
Writing Miscellaneous Articles Real Estate Arts And Crafts

Disclaimer: The information presented and opinions expressed in the articles are those of the authors
and do not necessarily represent the views of and/or its owners.

Copyright © AwareINDIA. All rights reserved || Privacy Policy || Terms Of Use || Author Guidelines || Free Articles
FAQs Link To Us || Submit An Article || Free Downloads|| Contact Us || Site Map  || Advertise with Us ||
Click here for Special webhosting packages for visitors of this website only!
Vastu Shastra

Premium Linux Reseller Hosting Provided By AwareIndia

Company IDS