blog




  • Essay / Wireless Security and Privacy Protocols Part 1

    This article will discuss wireless security from a general perspective and explain why wireless security is so important, especially today when our means of communication are changing radically. . From there, I'll discuss the multiple wireless titles available to give a better understanding of the options on offer. Next, I'll explain why failing to protect your wireless network can be so dangerous with some descriptions of the most dangerous wireless attacks that exist today. Finally, I will then discuss how we can better prepare for these types of attacks with a summary of several effective security methods that will help ensure that data is transmitted securely and hidden. Wireless is everywhere today, whether at home or working from your WIFI network. to work where you might be connected to a wireless network or even through your phone over a 3G or 4G network to connect to an open wireless network. As you can see, most people are connected to wireless from the time they leave home until they arrive at work and then back again. Wireless communication certainly offers an advantage over wired networks due to its mobility allowing users to connect from virtually anywhere. However, because of this convenience, they are also more physically exposed than wired networks due to the way data is transmitted, given the high number of attacker accesses. tip to attack constantly. This also raises concerns because with so many wireless networks constantly being established, most people will not recognize the importance of securing your network and how easily their data can and likely is stolen. Consider living in an apartment complex or neighborhood and do...... middle of paper ......Online. Retrieved April 29, 2014, from http://www.csoonline.com/article/2122635/mobile-security/wireless-security--the-basics.htmlCSO Staff (April 1, 2005). 5 essential elements of wireless security. OSC online. Retrieved April 29, 2014 from http://www.csoonline.com/article/2118534/mobile-security/5-essentials-to-wireless-security.htmlKathryn Tewson and Steve Riley (2008) Security Watch: A Guide to Wireless Security . TechNet Magazine. Retrieved April 29, 2014, from http://technet.microsoft.com/en-us/magazine/2005.11.securitywatch.aspxBrandon Widder (January 15, 2013). How to secure a wireless network. Digital trends. Retrieved April 29, 2014 from http://www.digitaltrends.com/computing/how-to-secure-a-wireless-network/Thomas M. Thomas. (July 16, 2004) Wireless Security. Cisco Press. Accessed May 13, 2014. http://www.ciscopress.com/articles/article.asp?p=177383&seqNum=5