Free Articles  >>  Computers and internet >>  Page 306  >> 

Security issues in Wireless networks

Wireless communication/networks provide an advantage of mobility over wired networks. Users can connect with the server of the organization with frequency links of electro-magnetic waves. Since such networks rely on EM waves, it enhances their serving capacity with the mobility feature.
Wireless networks are physically exposed, so the chances of intrusion in these networks are also high. The number of access points is high in wireless networks than traditional wired ones, so attackers keep scanning for those open points to enter the network and disrupt the working.

Some security issues or threats in wireless networks, affecting businesses are:
• Creating Rouge access points: Rouge access points are created within the range of existing wireless LAN. These create an illusion to a node of the network that rouge point is a part of the network and associates with such point. These are short duration attacks which are vulnerable for a short duration of time. Once the attacker associates itself with the physical port of company’s network, they can extend the period of vulnerability.
• Sniffing: Attackers or hackers use software called Sniffer, which allows them to scan the traffic and different access points in a location having many wireless networks. Sniffer helps them find an open unsecured network, which hackers use to latch themselves with.
• Denial of Service: Its simple concept makes it a more renowned security issue in network technology. It needs not access any port or any location in the server of company. Attacker simply overwhelms the network of the company by sending large packets of data so as to slow down the processing capabilities of server. This forces the server to deny the service to be provided to the user. In wireless networks, this is achieved by interfering with the frequency of operation of any wireless network.
• Bluesnarfing and bluejacking: Not only the conventional LANs but the Bluetooth are be used with the intention of data tampering and data theft. Bluejacking allows any unauthorized device to send messages to the device, which could be malicious in nature. Bluesnarfers can steal the data from the device. The most dangerous part of this technique is it cannot be traced if some bluesnarfer steals data from the device.
• Elvin twin: This threat creates a replica of the authorized host at attacker’s point. The authorized access point is blocked by the attacker and user is redirected via another access point under the authority of the attacker. This allows the attacker to control and analyze all the traffic from the user, including the keystrokes.
• War driver: Only a wireless device such as a laptop or PDA is required to attack some network. The device then roams around the network and locks-on with the unprotected wireless network. Hacker then records all the information ids, the physical address of the network etc. and uploads them on an online database. This directs all intruders to the unsecured address and creates a chaos in the wireless network.

Wireless network provides the ease of being present only in the close proximity to the attackers rather than being physically connected with the network. This enhances the chances of attacks and intrusion in a wireless network, thus compromising privacy of the users. There are various information and software security essentials that should be taken care of. These processes are incorporated in the whole development procedure of any organization providing offshore software development services.
About Author Kevin James :

Article Source:
Article Url:

Article Added on Friday, June 8, 2012
Other Articles by Kevin James

Wireless ERP
has provided the ease of access to information to the workforce of an organization. Information provided over wireless media like Wi-Fi etc. is further used for the organizational purposes. ERP or Enterprise Resource Planning is the software implementation and integration of various organizational bodies. This automation of various engaged functionalities, like finance, marketing, manufacturing, sales and services and other bodies, facilitates the flow of information between these nodes of...

Scope of Mobile Technology
As per Wikipedia, Mobile Technology is a collective term used to describe the various types of cellular communication technology. Mobile technology has come a long way from a simple CDMA technology to 4G.Today, mobile phones have instant messenger, video calling, in built GPS navigation system and embedded web browser which help the user to choose from thousands of web apps provided by their service providers. In this outsourcing software development world, Mobile devices are enabled to use...

Risk Assessment and Security management
Identifying risk and managing appropriate measures to minimize those risks is desired in every business. Different security parameters and risk assessment strategies are deployed by enterprises to undergo the successful execution of business operations. Risks are any unwanted activities which could arise during the execution time of a business process. Introduction of risk in the execution adversely affects the business with inflated development time of a product, causing failure to whole...

Best Practices for Mobile App Development
With the introduction of smart-phone technology, mobile application development became an integral part of the software development industry. Initially, smart-phones didn’t have much utility for the masses, they were aimed at providing services to business people only. But soon, Steve Jobs realized the necessity and future scope of smart-phones and began his work in getting smart-phone telephony to common man. It was then, a user-oriented smart-phone, known as the iPhone, entered our world...

VPN vs Cloud Computing
Businesses have evolved their data access habits since the past few years and now require data access from remote locations. They want to access company data for their workforce from remote locations securely. Such secure access to confidential data through internet was provided with two disparate technologies: VPN i.e. Virtual Private Network and Cloud Computing. VPN is nothing but a private network, which uses a public network to connect with remote users or sites. On the contrary, cloud...

Best practices for building E commerce
E-commerce has been a helpful service for both the customers and businesses. Businesses get the advantage of managing different bodies in an organizational process like finance, inventory, technology etc. Customers, on the other hand, need not to move from their locations and can purchase the goods with a click of the mouse. E-commerce service requires careful designing of architecture so as to provide a simple, user-friendly application yet powerful enough to conduct secure data processing...

Issues with Bulk E mail marketing
Bulk e-mail marketing is intended to reach the personal inbox or message space of prospects in order to advertise and give a glimpse about the company being promoted. Bulk emails are sent in batches to multiple recipients, where number of recipients varies from hundreds to thousands. Bulk emailing is generally a direct marketing technique employed by a variety of companies. This technique helps a business to reach out to thousands of prospects with a single email. Companies and businesses...

Successful Cloud Migration practices and strategies
Cloud brings in the ease of resource optimization and management to an organization. Cloud means outsourcing the IT requirements of an organization to external provider, who is full-time, professionally dedicated in providing such services to its client. Cloud migration is the process of migrating the company's data, applications, services etc. from its local premises to cloud servers. The reason for migration is to avail the services or applications or related data of an organization over...

Social Media in Education
Social media has brought a new dimension to the current education system at global level. Educational institutes are indulging themselves over social media platforms to educate their pupils and evolve their system of teaching and level of knowledge. Involvement of social media benefits an educational institute in terms of quality education, providing • quality content availability, • sound teaching methods and • Healthy interaction between students and institution. Social media also...

Social Media Disaster Management
Reputation management on a social media platform is what we deal with in Social media disaster management practices like degrading brand image, spreading fake news, rumors etc. Social media provides a direct exposure to the masses and potential customers for a business. Social media involvement helps businesses to stimulate a more personal touch to their business relationship. However, it is seen many times that while trying set up social media presence with flying colors, businesses often...

Click here to see More Articles by kevin james
Publishers / Webmasters
Article ID: 373918
DELINK URL from Authors Bio
REMOVE Article
Tell A Friend
Leave A Comment!
Download this article in PDF
Report Article!
Search through all the articles:

231 Users Online!!
Related Articles:
Latest Articles:
computers and internet >> Top 50 Articles on computers and internet
Category - >
Advertising Advice Affiliate Programs Automobiles
Be Your Own Mentor Careers Communication Consumers
CopyWriting Crime Domain Names DoT com Entrepreneur Corner
Ebooks Ecommerce Education Email
Entertainment Environment Family Finance And Business
Food & Drink Gardening Health & Fitness Hobbies
Home Business Home Improvement Humour House Holds
Internet And Computers Kiddos and Teens Legal Matters Mail Order
Management Marketing Marriage MetaPhysical
Motivational MultiMedia Multi Level Marketing NewsLetters
Pets Psychology Religion Parenting
Politics Sales Science Search Engine Optimization
Site Promotion Sports Technology Travel
Web Development Web Hosting WeightLoss Women's Corner
Writing Miscellaneous Articles Real Estate Arts And Crafts

Disclaimer: The information presented and opinions expressed in the articles are those of the authors
and do not necessarily represent the views of and/or its owners.

Copyright © AwareINDIA. All rights reserved || Privacy Policy || Terms Of Use || Author Guidelines || Free Articles
FAQs Link To Us || Submit An Article || Free Downloads|| Contact Us || Site Map  || Advertise with Us ||
Click here for Special webhosting packages for visitors of this website only!
Vastu Shastra

Premium Linux Reseller Hosting Provided By AwareIndia

Company IDS