0% found this document useful (0 votes)
200 views

Malla Reddy Institute of Technology & Science: Wireless Network Security

This document discusses wireless network security and provides details about: 1. It introduces wireless network security and describes how it protects wireless networks from unauthorized access through encryption. 2. It then provides a literature survey and principles of wireless network security, describing common security threats like packet sniffing, password theft, and man-in-the-middle attacks. 3. Finally, it outlines some advantages and disadvantages of wireless network security, and concludes with references.

Uploaded by

hruthik
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
200 views

Malla Reddy Institute of Technology & Science: Wireless Network Security

This document discusses wireless network security and provides details about: 1. It introduces wireless network security and describes how it protects wireless networks from unauthorized access through encryption. 2. It then provides a literature survey and principles of wireless network security, describing common security threats like packet sniffing, password theft, and man-in-the-middle attacks. 3. Finally, it outlines some advantages and disadvantages of wireless network security, and concludes with references.

Uploaded by

hruthik
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 32

MALLA REDDY INSTITUTE OF TECHNOLOGY & SCIENCE

(Approved by AICTE, NEW DELHI & Permanently Affiliated to JNTUH)


Maisammaguda, Dhulapally, Secunderabad-500100.
(2020-2021)

DEPARTMENT OF INFORMATION TECHNOLOGY

A TECHNICAL SEMINAR REPORT


ON
WIRELESS NETWORK SECURITY
By
P.NIHARIKA (17S11A1217)
WIRELESS NETWORK SECURITY

INDEX
Table of contents Page No.

1. Abstract i

2. List of figures ii

3. List of tables i

4. Introduction 1

5. Literature Survey 5

6. principle of Wireless Network Security 6

7. Advantages 23

8. Disadvantages 25

9. Conclusion 26

10. References 27
WIRELESS NETWORK SECURITY

1. ABSTRACT

This is the study over the wireless network security. As the wireless
communication has the different way of physical transport compared to wire
environment of communication thus we have to use different measure to secure a
network in wireless environment. Wireless networking has more security threats and
vulnerabilities and we must have an effective management of it compare with wired
technology which is more a management issue. Wireless networking has very
important features as it offer firm and user’s flexibility, and portability with in the
budget. It allow the users to get access to the network without the physical wired tied
between them. It uses high frequency radio waves to communicate between devices.

A Wireless Network is a wireless communication system that allows


computers and workstations to communicate and exchange data with each other using
radio waves as the transmission medium. WLAN is commonly referred to as Wi-Fi
(wireless fidelity). Wireless local area networks give freedom to one move their
laptops from one place to other within their offices and organizations without the
need for wires and without losing network connectivity. Nowadays wireless networks
are used in many areas such as in universities, healthcare-centers, hospitals, police
departments, military and airports. Therefore, it is very important to enhance the
network security in order to protect the information of the network. Different security
protocols have been designed to protect the network, among which are WEP, WPA,
and WPA2. Since air transmission is a defenseless medium, it gives opportunity to
attackers to intercept the information that can be used to launch different types of
attacks. Therefore, it is important to know different kind of security attacks at
different layers in order to defend the wireless networks.
WIRELESS NETWORK SECURITY

2. List of Figures Page No.


1. Wireless network 6
2. Packet Sniffing 7
3. Password Theft 9
4. Man in Middle attack 9
5. Fully Secured System 14
6. Firewall 15
7. Wireless Access Point 15
8. Modem 16
9. Server 16
10. Wireless Network Theft 21

3. List of Tables Page No


1. Detailed comparison among Wireless Networks 4
WIRELESS NETWORK SECURITY

4. INTRODUCTION
Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the costly process of
introducing cables into buildings or as a connection between different equipment
locations. The basis of wireless systems are radio waves, an implementation that takes
place at the physical level of network structure.

Wireless networks use radio waves to connect devices such as laptops to the Internet,
the business network and applications. When laptops are connected to Wi-Fi hot spots
in public places, the connection is established to that business’s wireless network.

Wireless network security primarily protects a wireless network from unauthorized


and malicious access attempts. Typically, wireless network security is delivered
through wireless devices (usually a wireless router/switch) that encrypts and secures
all wireless communicationby default

Wireless network security is the process of designing, implementing and ensuring


security on a wireless computer network. It is a subset of network security that adds
protection for a wireless computer network.Wireless network security is also known
as wireless security.

Wireless network security primarily protects a wireless network from unauthorized


and malicious access attempts. Typically, wireless network security is delivered
through wireless devices (usually a wireless router/switch) that encrypts and secures
all wireless communication by default.

wireless networks have an important role to play in the development of a country like
India. Wireless networks are very common, both for organizations and individuals.
Many laptop computers have wireless cards pre-installed. The ability to enter a
network while mobile phones and tablets also great benefits. However, wireless
networking has many security issues. Hackers have found wireless networks
WIRELESS NETWORK SECURITY

relatively easy to break into, and even use wireless technology to crack into wired
networks. So there should have proper Management of Operational and Technical
issues and recommendations for the secure deployment of wireless network security.
In this unit will introduce the benefits, components and security issues in wireless
networks.

Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the expensive
process of introducing cables into buildings or as a connection between different
equipment locations. The basis of wireless systems is radio waves, an implementation
that takes place at the physical level of network structure. Wireless networks use
radio waves to connect devices such as laptops to the Internet, the business network
and applications. When laptops are connected to Wi-Fi hot spots in public places, the
connection is established to that business’s wireless network.

Types of Wireless Networks


There are four main types of wireless networks:

1. Wireless Local Area Network (WLAN).


2. Wireless Metropolitan Area Networks (WMAN).
3. Wireless Wide Area Network (WWAN).
4. Wireless Personal Area Network (WPAN)

· Wireless Local Area Network (WLAN): Links two or more devices using a
wireless distribution method, providing a connection through access points to the
wider Internet. Sometimes known as LAWN (Local Area Wireless Network), this
type of network takes place when any handheld device, preferably smartphones, is
connected to the nearest networks with the help of a wireless connection. A WLAN
can be constructed through any kind of wireless network protocol, but the most
common way of ensuring a connection is through a Bluetooth or Wi-Fi.
WIRELESS NETWORK SECURITY

The WLAN support can range from two or more devices. However, once the number
of devices starts to increase, this wireless network becomes difficult to manage. Also,
you will need to rely on repeaters or signal boosters to cover a vast geographical
location

· Wireless Metropolitan Area Networks (WMAN): Connects several wireless


LANs.

A wireless network that is intended to cover an area that ranges around 31 miles or 50
kilometers is a WMAN. This specific branch of the network allows multiple locations
or buildings to stay connected within any metropolitan area. It is used to connect
different campuses of a single university, various blocks of a hospital, and multiple
office buildings. The secure connection does not require a network of cables running
from one building to the next. Instead, it relies on strong radio waves or infrared light
to transmit data.

· Wireless Wide Area Network (WWAN): Covers large areas such as


neighboring towns and cities. As the name suggests, this type covers wireless
networks over a wide area. This is achieved by wirelessly connecting coverage cells
to provide services to an expanded geographical location. The WWAN is typically
used to cater to the smartphones’ market through cellular service providers. To use
this wireless network, special WAN cards are to be installed within the devices.

· Wireless Personal Area Network (WPAN): Interconnects devices in a short


span, generally within a person’s reach. This personal area network provides a
wireless connection to devices that surround an individual’s personal space. In a
typical network, the WPAN makes use of a technology that enables wireless
communication within a range of 10 meters. This makes the WPAN a short-range
network.

The need to have WPAN is increasing rapidly. As more and more individuals rely on
electronic devices within their workspace or homes, a distinct need to have stable
wireless connection among the devices has emerged.
WIRELESS NETWORK SECURITY

Type Coverage Performance Standards Applications


Wireless LAN Within reach Moderate Wireless PAN Cable
of a person Within reach of a replacement
person Moderate for peripherals
Bluetooth, IEEE
802.15, and IrDa
Cable
replacement for
peripherals
Wireless MAN Within a High IEEE 802.11, Mobile
building or Wi-Fi, and Hiper extension of
campus LAN wired networks
Wireless WAN Within a city High Proprietary, IEEE Fixed wireless
802.16, and between homes
WIMAX and businesses
and the
Internet
Wireless PAN Worldwide Low CDPD and Mobile access
Cellular 2G, to the Internet
2.5G, and 3G,4G from outdoor
areas
WIRELESS NETWORK SECURITY

5 . Literature Survey
Wireless network or Wi-Fi, the moment you hear these words you realize how
convenient your life has become. Wireless Internet Connection has made it easy for
anyone to use the Internet at any device ranging from Laptops, Smartphones, and
Tablets, etc. from anywhere in the house without managing tons of cable bundles.

One important thing to consider here that wireless network does not end at your home
or office’s wall, it is possible that the signals of your wireless network are extended to
other neighboring homes or offices. Today we are going to discuss why you should
secure wireless network that you use at home, home office or office.

Nowadays the application of a Wi-fi connection is not limited just to browsing the
internet using any device, but you can attach a lot of other devices as per your
convenience, for instance, you can take printout while sitting in a different room or
floor of the house altogether.

I was browsing through some YouTube videos the other day and found out that many
people do not secure wireless network, some don’t even know about it and many just
ignore it.

Wireless network sure makes our life easy but while using wi-fi we also have to
ensure that the home network that we are using is also secure. Because if we do not
secure wireless network connection, then there are consequences as well. For
example, our neighbors can use our internet connection and consume our bandwidth
or make our internet connection slow. If they are little bit tech savvy then sure can
track out online activities as well. Even worse, cyber criminals can use your internet
connection to download/upload illegal materials leaving you prone to a legal action.

So it was not a rocket science to understand how many risks are involved if you do
not have a secure wireless network, now in this part of the article we are going to
discuss the ways you can secure wireless network.
WIRELESS NETWORK SECURITY

6. Principle of Wireless Network Security

Wireless Network Attack

Wireless attacks have become a very common security issue when it comes to
networks. This is because such attacks can really get a lot of information that is being
sent across a network and use it to commit some crimes in other networks. Every
wireless network is very vulnerable to such kinds of attacks and it is therefore very
important that all the necessary security measures are taken so as to prevent the mess
that can be caused by such attacks. These attacks are normally carried out to target
information that is being shared through the networks. It is therefore very important
to know of such attacks so that one is in a position to identify it in case it happens.
Some of the common network attacks have been outlined below.

With the widespread use of internet, we are able to conduct our business processes
online and without being tied down by cables and wires. Wireless networks are one of
the relatively new technologies brought to our lives by the internet technologies.
They are easy to use, facilitate our business processes and mobilize our businesses.
On the downside, wireless networks are much more vulnerable to attacks and
intruders.

Commonly known as wireless network attacks, penetration and intrusion acts that
target wireless networks pose serious threats. Wireless network attacks aim to capture
the information sent across the network and/or intrude with the traffic of information.
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY

Types of Wireless Network attack


Wireless Attacks can come at you through different methods. For the most part you
need to worry about Wi-Fi. Some methods rely on tricking users, others use brute
force, and some look for people who don’t bother to secure their network. Many of
these attacks are intertwined with each other in real world use. Here are some of the
kinds of attacks you could encounter.

1.Packet Sniffing:

When information is sent back and forth over a network, it is sent in what we call
packets. Since wireless traffic is sent over the air, it’s very easy to cap ture. Quite a lot
of traffic (FTP, HTTP, SNMP, etc.) is sent in the clear, meaning that there is no
encryption and files are in plain text for anyone to read. So using a tool
like Wireshark allows you to read data transfers in plain text! This can lead to stolen
passwords or leaks of sensitive information quite easily. Encrypted data can be
captured as well, but it’s obviously much harder for an attacker to decipher the
encrypted data packets.

2.Rouge access points:


WIRELESS NETWORK SECURITY

When an unauthorized access point (AP) appears on a network, it is refer to as a


rouge access point. These can pop up from an employee who doesn’t know better, or
a person with ill intent. These APs represent a vulnerability to the network because
they leave it open to a variety of attacks. These include vulnerability scans for attack
preparation, ARP poisoning, packet captures, and Denial of Service attacks.

3.Jamming:

There are a number of ways to jam a wireless network. One method is


flooding an AP with de authentication frames. This effectively overwhelms the
network and prevents legitimate transmissions from getting through. This attack is a
little unusual because there probably isn’t anything in it for the hacker. One of the
few examples of how this could benefit someone is through a business jamming their
competitors Wi-Fi signal. This is highly illegal (as are all these attacks), so businesses
would tend to shy away from it. If they got caught they would be facing serious
charges.

4.Password Theft:

When communicating over wireless networks, think of how often you log into a
website. You send passwords out over the network, and if the site doesn’t use SSL or
TLS, that password is sitting in plain text for an attacker to read. There are even ways
to get around those encryption methods to steal the password. I’ll talk about this with
man in the middle attacks.
WIRELESS NETWORK SECURITY

4.Man in the Middle Attack:

It’s possible for hackers to trick communicating devices into sending their
transmissions to the attacker’s system. Here they can record the traffic to view later
(like in packet sniffing) and even change the contents of files. Various types of
malware can be inserted into these packets, e-mail content could be changed, or the
traffic could be dropped so that communication is blocked.

5.Jamming:

There are a number of ways to jam a wireless network. One method is


flooding an AP with de authentication frames. This effectively overwhelms the
network and prevents legitimate transmissions from getting through. This attack is a
little unusual because there probably isn’t anything in it for the hacker. One of the
WIRELESS NETWORK SECURITY

few examples of how this could benefit someone is through a business jamming their
competitors Wi-Fi signal. This is highly illegal (as are all these attacks), so businesses
would tend to shy away from it. If they got caught they would be facing serious
charges.

6.Bluetooth Attack:

There are a variety of Bluetooth exploits out there. These range from annoying pop
-up messages, to full control over the a victims Bluetooth enabled device.

7.War Driving:

War driving comes from an old term called war dialing, where people would dial
random phone numbers in search of modems. War driving is basically people driving
around looking for vulnerable APs to attack. People will even use drones to try and
hack APs on higher floors of a building. A company that owns multiple floors around
ten stories up might assume nobody is even in range to hack their wireless, but there
is no end to the creativity of hackers.
WIRELESS NETWORK SECURITY

Wireless Security
Wireless Internet access technology is being increasingly deployed in both office and
public environments, as well as by the Internet users at home. Wireless technologies,
in the simplest sense, enable one or more devices to communicate without physical
connections—without requiring network or peripheral cabling. Wireless technologies
use radio frequency transmissions as the means for transmitting data, whereas wired
technologies use cables.

Wireless devices communicate through radio transmissions, without physical


connections and without network or peripheral cabling. Wireless systems include
local area networks, personal networks, cell phones, and devices such as wireless
headphones, microphones, and other devices that do not process or store information.
Other wireless devices being widely used include infrared (IR) devices such as
remote controls, cordless computer keyboards, mouse devices, and wireless hi-fi
stereo headsets, all of which require a direct line of sight between the transmitter and
the receiver.

Wireless security is the prevention of unauthorized access or damage to computers


using wireless networks. The most common types of wireless security are Wired
Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously
weak security standard. WEP is an old IEEE 802.11 standard from 1999, which was
out dated in 2003 by WPA, or WiFi Protected Access. WPA was a quick alternative
to improve security over WEP. The current standard is WPA2; some hardware cannot
support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption
device that encrypts the network with a 256-bit key; the longer key length improves
WIRELESS NETWORK SECURITY

security over WEP. Only clients who know a shared secret may connect to the
network.

Minimize the risks to your wireless network


1.Change default passwords:

Most network devices, including wireless access points, are pre-configured with
default administrator passwords to simplify setup. These default passwords are easily
available to obtain online, and so provide only marginal protection. Changing default
passwords makes it harder for attackers to access a device. Use and periodic changing
of complex passwords is your first line of defense in protecting your device.

2.Restrict access:

Only allow authorized users to access your network. Each piece of hardware
connected to a network has a media access control (MAC) address. You can restrict
access to your network by filtering these MAC addresses. Consult your user
documentation for specific information about enabling these features. You can also
utilize the “guest” account, which is a widely used feature on many wireless routers.
This feature allows you to grant wireless access to guests on a separate wireless
channel with a separate password, while maintaining the privacy of your primary
credentials.

3.Encrypt the data on your network:

  Encrypting your wireless data prevents anyone who might be able to access your
network from viewing it. There are several encryption protocols available to provide
this protection. Wi-Fi Protected Access (WPA), WPA2, and WPA3 encrypt
information being transmitted between wireless routers and wireless devices. WPA3
is currently the strongest encryption. WPA and WPA2 are still available; however, it
is advisable to use equipment that specifically supports WPA3, as using the other
protocols could leave your network open to exploitation.
WIRELESS NETWORK SECURITY

4. Protect your Service Set Identifier (SSID):

To prevent outsiders from easily accessing your network, avoid publicizing your
SSID. All Wi-Fi routers allow users to protect their device’s SSID, which makes it
more difficult for attackers to find a network. At the very least, change your SSID to
something unique. Leaving it as the manufacturer’s default could allow a potential
attacker to identify the type of router and possibly exploit any known vulnerabilities.

5. Install a firewall:

 Consider installing a firewall directly on your wireless devices (a host-based


firewall), as well as on your home network (a router- or modem-based firewall).
Attackers who can directly tap into your wireless network may be able to circumvent
your network firewall—a host-based firewall will add a layer of protection to the data
on your computer.

6. Maintain antivirus software: 

 Install antivirus software and keep your virus definitions up to date. Many antivirus

programs also have additional features that detect or protect against spyware and
adware.

7. Use file sharing with caution: 

File sharing between devices should be disabled when not needed. You should always
choose to only allow file sharing over home or work networks, never on public
networks. You may want to consider creating a dedicated directory for file sharing
and restrict access.  

8. Keep your access point software patched and up to date:

The manufacturer of your wireless access point will periodically release updates to
and patches for a device’s software and firmware. Be sure to check the
manufacturer’s website regularly for any updates or patches for your device.
WIRELESS NETWORK SECURITY

9.Connect using a Virtual Private Network (VPN):

Many companies and organizations have a VPN. VPNs allow employees to connect
securely to their network when away from the office. VPNs encrypt connections at
the sending and receiving ends and keep out traffic that is not properly encrypted. If a
VPN is available to you, make sure you log onto it any time you need to use a public
wireless access point.

Many companies and organizations have a VPN. VPNs allow employees to connect
securely to their network when away from the office.
WIRELESS NETWORK SECURITY

Wireless Network Components

1.Firewall:

A firewall is a network security system designed to prevent unauthorized access to or


from a private network. Firewalls can be implemented in both hardware and software,
or a combination of both.

2.Wireless Access Point:

In computer networking, a wireless access point (WAP) is a networking hardware


device that allows a Wi-Fi compliant device to connect to a wired network. The WAP
usually connects to a router (via a wired network) as a standalone device, but it can
also be an integral component of the router itself. This is an area in which you can
access the wireless network. An example of this device would be a wireless router.
WIRELESS NETWORK SECURITY

2. Modem :
A modem (modulator-demodulator) is a network hardware device that
modulates one or more carrier wave signals to encode digital information for

transmission and demodulates signals to decode the transmitted information. The goal
is to produce a signal that can be transmitted easily and decoded to reproduce the
original digital data. Modems can be used with any means of transmitting analog
signals, from light emitting diodes to radio. A common type of modem is one that
turns the digital data of a computer transmission over telephone lines the receiver side
to recover the digital data.

4.Server:

In information technology, a server is a services to other computer programs (and


their users) in the same or other computers. The computer that a server program runs
in is a server (though it may be used for other purposes as well).
WIRELESS NETWORK SECURITY

5.Hub :

A hub is rectangular box that is used as the central object on which computers and
other devices are connected. To make this possible, a hub is equipped with small
holes

called ports. It can be equipped with 4, 8, 12, 16, 32 ports.

6. Routers:

Like a hub, a router is another type of device that acts as the central point among
computers and other devices that are part of a network Security.
WIRELESS NETWORK SECURITY

Types of Wireless Security


Wireless security is of two types:

1.WEP.
2.WPA.

1.WEP stands for Wired Equivalent Privacy. WEP was designed to provide the same
level of security as wired networks. When you enable WEP, you set up a network
security key. This key encrypts the information that one computer sends to another
computer across your network. However, WEP security is relatively easy to crack.
When using WEP, all clients and APs on a wireless network use the same key to
encrypt and decrypt data. The key resides in the client in each AP on the network.
Since the 802.11 standard does not specify a key management protocol.15 The shared
key can be used for client authentication. This requires a four step process between
the AP and the client. This process is as follows:

1. The client makes an authentication request to the AP.

2. The AP returns a challenge phrase to the client.

3. The client encrypts the challenge phrase using the shared symmetric key and
transmits it to the AP.
WIRELESS NETWORK SECURITY

4. The AP then compares the client's response with its phrase; if there is a match, the
client is authorized otherwise the client is rejected.

Security problems with WEP include the following:

1. The use of static WEP keys.


2. Caffe Latte attack.
3. 3. WEP provides no cryptographic integrity protection.
4. 4. Authentication is not enabled; only simple SSID identification occurs.
Device authentication is simple shared-key challenge-response.

2.WPA also implements something called the Extensible Authentication Protocol


(EAP) for authorizing users. Instead of authorizing computers based solely on
their MAC address, WPA can use several other methods to verify each computer's
identity. This makes it more difficult for unauthorized systems to gain access to
the wireless network.
WIRELESS NETWORK SECURITY

Wireless Network Threats:


The most common wireless network threats are:

1. Configuration Problems:Misconfigurations, incomplete


configurations.

2. Denial of Service:Sending large amounts of traffic (or viruses) over the


network with the intent of hijacking resources or introducing backdoors.

3. Passive Capturing: Eavesdropping within range of an access point to


capture sensitive information.

4. Rogue (or Unauthorized/Ad-Hoc) Access Points : Fool devices into


connecting with a false access point.

5. Evil Twin Attacks: Impersonating legit access points with a stronger


signal to entice authorized users to sign on.

6. Hacking of Lost or Stolen Wireless Devices: Bypassing the


password to gain access.

7. Freeloading:Piggybacking on a connection or intercepting file sharing.

The risk of attacks occurring on wireless LAN’s is high. In fact, two-thirds


of small-and medium-sized businesses reported a cyber attack in 2018. And, the
average cost of the attack on these businesses was almost $3 million due to the costs
of sustained system outages and disruption (40% of servers were down for 8+ hours
when a breach occurred).
WIRELESS NETWORK SECURITY

There are a number of reasons for this great increase in attacks, but the main one is
that the nature of a wireless network is to provide easy access to end users, but this
ease of access creates a more open attack surface. Unlike a wired network that
requires an attacker to physically access part of the network, a wireless network only
requires that the attacker be in close proximity (and even this is relative). Also, there
is a general lack of knowledge and awareness of wireless networks.

Let’s cover the general basics of wireless security to gain some background
information.

Security Concerns for Wireless Networks in Businesses


WIRELESS NETWORK SECURITY

Working in reverse, in using customer networks, you are giving up security in two
regards: you're connecting to a network that may or may not require a password that
anyone can obtain. You have no way to ascertain the security of the network or even
verify and validate that it is truly the network and not an "Evil Twin". You have no
way to make sure no one can intercept and read and/or modify your data.
Furthermore, while not dangerous yet still annoying, the stores can also monitor your
connections and dependent upon the fine print you click "OK" in order to connect,
they could query your device and get data about you. This data could be the apps you
have installed, location data, and others.

Public Wireless Security Issues:

Public Wireless networks (for this, those with a Pre-Shared Key) are not much safer,
if at all. While they may not have the same intentions as retail stores, there is no level
of assurance or legal obligation for them to secure your device or data. Again, you
have no way to make sure no one can intercept and read and/or modify your data.
You should question why this network exists, especially if the connection is free. You
are probably the "product" via data mining (like retail stores above) or via
advertising.

Security Concerns with Wireless Networks:

Open Wireless networks are bastions for malicious intent. While some people
genuinely want to share and others are ignorant as to the possible outcomes or the
ability to secure the networks, others blatantly leave the networks open. Again, you
have no way to make sure no one can intercept and read and/or modify your data.

Advantages and Disadvantages of


WIRELESS NETWORK SECURITY

Wireless Network Security

7.Advantages

1.Protect Data:

As discussed, network security keeps a check on unauthorized access. A network


contains a lot of confidential data like the personal client data. Anybody who breaks
into the network may hamper these sensitive data. So, network security should be
there in place to protect them.

2. Prevents cyber attack:

Most of the attack on the network comes from internet. There are hackers who are
experts in this and then there are virus attacks. If careless, they can play with a lot of
information available in the network. The network security can prevent these attacks
from harming the computers.

3.Levels of access:

The security software gives different levels of access to different users. The
authentication of the user is followed by the authorization technique where it is
checked whether the user is authorized to access certain resource. You may have seen
certain shared documents password protected for security. The software clearly
knows which resources are accessible by whom.
WIRELESS NETWORK SECURITY

4.Centrally controlled:

Unlike the desktop security software, the network security software is controlled by a
central user called network administrator. While the former is prone to worms and
virus attacks, the latter can prevent the hackers before they damage anything. This is
because the software is installed in a machine having no internet.

5.Centralized updates:

It is very important that the anti-virus software is timely updated. An old version may
not offer you enough security against attackers. But it is not guaranteed that every
user of the network follows it religiously. A network security system which is
centralized offers this advantage of timely updates without even the knowledge of the
individuals.

8 . Disadvantages
WIRELESS NETWORK SECURITY

Network security is a real boon to the users to ensure the security of their data. While
it has many advantages, it has lesser disadvantages. Let us discuss some of them.

1.Costly set up:

The set up of a network security system can be a bit expensive. Purchasing the
software, installing it etc can become costly especially for smaller networks. Here we
are not talking about a single computer, but a network of computers storing massive
data. So, the security being of prime importance will definitely cost more. It cannot
be ignored at any cost.

2. Time consuming:

The software installed on some networks is difficult to work with. It needs


authentication using two passwords to ensure double security which has to be entered
every time you edit a document. It also requires the passwords to be unique with
numbers, special characters and alphabets. The user may have to type a number of
sample passwords before one is finalized which takes a lot of time.

3.Requires skilled staff:

To manage large networks is not an easy task. It requires highly skilled technicians
who can handle any security issue that arises. A network administrator needs to be
employed to ensure smooth working of the network. He must be trained adequately to
meet the requirement.

4.Careless admin:

When the best software is installed and everything required is done, it is natural for
the admin to be careless at times. It is his job to check the logs regularly to keep a
check on the malicious users. But sometimes, he just trusts the system and that is
when the attack happens.

9. Conclusion
WIRELESS NETWORK SECURITY

In conclusion, wireless network security globally is something that people can expect
as technology advances. Wireless network security has a lot of benefits and can make
the world a lot more efficient. It does have concerns though as with every other new
advancement that is made in today’s world.

The issues with security regarding access to a person’s personal information or the
negative impact that it may seem to have on society are a few things that are holding
back the progress that wireless technology could be making. With more research and
experiments conducted, the problems associated with wireless network security can
be reduced and make it a more significant part of the world.

Wireless networks, which by their nature, facilitate access to the radio, are more
vulnerable than wired networks and need to encrypt communications to deal with
sniffing and continuously checking the identity of the mobile nodes. The mobility
factor adds more challenges to security, namely monitoring and maintenance of
secure traffic transport of mobile nodes.

This concerns both homogenous and heterogenous mobility (inter-technology), the


latter requires homogenization of the security level of all networks visited by the
mobile. Wireless technology will be very important in the near future where the need
for wires connecting individual devices seems to be coming to an end.
WIRELESS NETWORK SECURITY

10. REFERENCES
1. https://www.techopedia.com/definition/29915/wireless-network-security

2. https://phoenixts.com/blog/types-of-wireless-network-attacks/

3. https://www.shireeninc.com/types-of-wireless-networks/

4 . http://isc2central.blogspot.com/2018/04/advantages-and-disadvantages-of-

network.html

You might also like