Tuesday, June 18, 2019

Wireless security Essay Example | Topics and Well Written Essays - 500 words - 2

Wireless security - Essay ExampleThe activities performed by user on the cyberspace can be both casual and confidential in nature. None the less for any of the activities performed over the internet every user wants privacy and security. certification of the connection ensures the integrity and originality of the information and assures the user that his information is safe. Wireless connection employ the use of radiowaves for communication and flow of data between the devices. These radiowaves can good be tapped, intercepted and the information can be read or stolen and even in some case altered and manipulated hence raising the concern of data integrity and originality.Facing the threats that came with the increasing and rapid growth in the number of users of wireless technology the requirements for development of measures for security and integrity of data and network too arose. Although number of people were lazy and most of them were unaware of the security threats they fac ed using wireless form of connections, such people were only concerned well-nigh the availability of the internet and were satisfied as long as they were able to operate the internet. Now to ensure security while using wireless connections mixed forms of security were developed which included WEP,WAP and WAP2 etc.WEP - Wired Equivalent Privacy (or Wireless Encryption Protocol), was introduced as the first line of security to tackle the threats that were occurring. It was a weak option for security as it only had encryption to a basic level. After the passage of time a lot of weaknesses were found in it and did not remain as secure as it was thought earlier. It did not provide end to end protection as it only used at the two lowest layers of OSI. Later on it was found out that it didnt protect packets from being intercepted and any hacker could get enough stream of packets which would be enough for him to extract the encryption scheme.After significant flaws were found in WEP another technology WPA

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.