This website uses cookies to ensure you have the best experience. Learn more

Wireless Network Security Essay

3559 words - 14 pages

Introduction
Wireless networks have grown in popularity. This is largely due to the increase in the value of a network as more users are attached to it. The value added to a network by nature of connecting more devices to it, is summarized in 'Metcalf's law.' Metcalf's law states that if you 'connect any number, 'n,' of machines - whether computers, phones or even cars - and you get 'n' squared potential value.'[1] The incredible growth of the Internet seems to validate Metcalf's law. It then seems reasonable that eliminating physical constraints to connecting to a network would provide value by allowing more devices to be connected to a network regardless of physical location. Wireless networks provide that ability.

Wireless networks operate over the full spectrum of network topographies. These topographies include: Personal, Local, Controller, Metropolitan, and Wide area networks. A Personal Area Network (PAN) is ??the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.?[2] A Local Area Network (LAN) is ?? a group of computers and associated devices that share a common communications line or wireless link and typically share the resources of a single processor or server within a small geographic area (for example, within an office building).?[2] A Campus Area Network (CAN) is a fiber-optic network that physically interconnects entire buildings into one giant network. While each building may have several discrete LANs within it, each building represents a single node on the CAN. [3] A Metropolitan Area Network (MAN) is ?a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large [LAN] but smaller than the area covered by a wide area network (WAN [- explained next]).?[2] A Wide Area Network (WAN) is ?a geographically dispersed telecommunications network.?[2]
Wireless networks come in many configurations and use many technologies. Figure 1 depicts an example of the wireless technologies and standards used for each of the networks types defined above. The figure indicates two major categories of wireless technologies: fixed and mobile. The figure also indicates 10 technologies in use: Bluetooth, irDA, 802.11, IR LAN, IR Bridge, Ricochet, RF Bridge, Cellular, MCS and Satellite. Virtually all of these technologies play a role in multiple topographies. It is interesting to note that the 802.11 standard has only been assigned to the Mobile LAN and CAN topographies. It has been omitted from them PAN topography. I believe this is an oversight, and I will provide rational for this in a later section.

Each wireless technology has unique security risks and concerns. Many of the risks and concerns are shared across technologies. In order to provide even a brief overview of each technology, topography, and the risks inherent to each would require a document far larger than is specified for this...

Find Another Essay On Wireless Network Security

Small Office Secure Network Proposal Essay

668 words - 3 pages This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company. I would suggest conducting a site survey before finalizing a network layout. A site

Information Technology – Structure of Data

1139 words - 5 pages . Effective risk management should be integrated into the System Development Life Cycle (SDLC) of an IT system. The security of wireless networks and devices should be considered from the initial planning stage because it is much more difficult to address security once deployment and implementation have occurred. A detailed, well-designed plan can point the way to better security decisions about configuring wireless devices and network

Wireless Area Networks

1978 words - 8 pages wireless technology has its roots in military applications, all wireless systems contain varying degrees of security for their users. More often then not each individual network with have a unique encryption code that will make it all but impossible for unintended listeners to gain access to network traffic. Generally, all adapters must have their security enable before the receivers will even detect a wireless network is present. Even

Compatibility of Wireless Technology

1165 words - 5 pages Wireless LAN Performance. Retrieved April 25, 2009, from Network ProPortal: http://network.itproportal.com/network/news/article/2008/4/22/19-factors-affecting-wireless-lan-performance/3/ Safecom, n.d., Emerging Wireless Technologies, Viewed April 11, 2009, from Homeland Security: <http://www.safecomprogram.gov/NR/rdonlyres/5C74C631-ACF6-433F-B313-C04D041A5489/0/Look_Future_Wireless_Communications_Beyond3G.pdf> An additional source Compatibility of Wireless Technology 3

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1073 words - 5 pages Protection of Wireless Networks Setting security policy is important for a wireless network. Improvements in the security of wireless technology will guarantee its continued safe use, and system administrators’ duties are to take measures against unauthorized access. A media access control address (MAC address) is an identity number assigned to each network device. Most Wi-Fi access points and routers come with a function called MAC address

Market Analysis on Wireless Business Growth

1602 words - 6 pages . Even though many security providers are introducing new wireless security systems to the public, both consumers and corporations are fearful of compromising private data in such uncertain situations.Technology LimitationsThough the wireless network infrastructure is moving from 2G to 2.5G and 3G, thenetwork bandwidth is still relatively low, and that is slowing down the adoption of wirelessbusiness applications. Besides the network bandwidth

Securing WLAN/LAN

1734 words - 7 pages security have arisen as productivity increased. By means, wireless signals proliferate beyond the physical boundaries of the organization, nullifying the traditional view that the inside of the organization is protected (Secunia, 2007). Signals from unsecured WLANs that stretch outside the corporate network can be found and used by unauthorized personnel—or even malevolent hackers. Albeit the wireless medium has precise exceptional characteristics

Wireless Security and Privacy Protocols Part 2

1540 words - 7 pages that device is not connected. However just like SSID cloaking while a little more secure is not going to keep everyone from finding a way in it does provide that extra layer of security that could make the difference. One technique that should not be missed and is used pretty much in any network you see today wired or wireless is the use of a firewall. A firewall can either be used from the router or separate but will provide you a multitude of

The insecurities surrounding wireless networks with a brief background on how wireless networks work

2362 words - 9 pages connection between networks in different buildings. The second application of WLANs is in building. This allows users to roam freely within a building and remain connected to the network."It often said that wireless technology was designed for ease of use and interoperability first and security as an after thought.(Revisto)"Some of the more serious security concerns with wireless networks include the following type of attacks: Insertion Attacks

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

926 words - 4 pages settings for SSID, VLAN, encryption, mac address filtering, password protection, as well as locating wireless access points and constantly updating software can reduce wireless network security risks. Cisco reports an amazing statistic that there are more than one hundred million wireless users in the world and more than one million wireless access points have sold. Apple has stopped building laptops with Ethernet ports due to the popularity of

Information Systems: What We Do With It

758 words - 3 pages their productivity. It's almost a must that users accept the use of wireless products. This is causing users to increase their knowledge of wireless technology, because they are aware of the wireless movement. In just about every industry today, wireless technology is being deployed.The major motivation and benefit of a wireless information system is increased mobility. The difference from conventional network connections, network users can move

Similar Essays

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages Steps to Effectively Respond to a Security Incident and Threats on a Wireless Network Incident response is usually one of those security areas that tend to be impromptu—companies don't think about it until they have to. But that needs to change. In this paper I will discuss five steps - identification, containment, eradication, and recovery and follow up a business use to effectively response to a security threat and I will suggest four

Investing In The Future: Why The Medical Field Should Invest In Wireless Networks

1264 words - 6 pages prepare to plan treatments. A wireless connection to the LAN with a computer configured for it would provide data throughout the office, especially chair-side, as well as in the other areas of the department [5].This wireless network also permits easier simultaneous access to patient data, saving time in a busy radiation oncology department. Time is very important because hospitals deal with life and death. Wireless Networks Security Pros and Cons

Implementing A New Wide Secure Wireless Network At Brigham Young University Hawaii

2628 words - 11 pages Introduction Brigham Young University Hawaii Campus wants to implement a campus wide secure wireless network. In their existing system there are some network security flaws such as rouge access point (Easily accessible open network), anyone can access and capture important information of users. We have been hired by the BYU-HAWAII to design and install a wireless network solution for the university. EXISTING SYSTEM Users-3000 User type-Students

Investing In The Future: Why The Medical Field Should Invest In Wireless Networks 1140 Words

1140 words - 5 pages Wired and wireless networks have become very common. No computer network is completely secure as wireless networks still have not developed advanced security for wireless access points and wired networks still have not developed total convenience. Large business enterprises and research laboratories focus on speed, mobility and flexibility on wireless networks while technology engineers focus on security and cost. When there is highly sensitive