Wireless Security And Privacy Protocols Part 2

1540 words - 7 pages

Now that we have discussed the numerous threats that are out to attack a weak wireless network how exactly can we make our wireless network that much stronger in order to prevent or deter intrusion from the outside and also to limit user error. In order to secure our network first and foremost it is important to set guidelines or policies for businesses to ensure the right steps are being taken. Now for the most part policies are going to be implied for businesses however have some guidelines for even your home network to ensure you have followed the necessary steps to properly setup your wireless network is also just as important. A strong policy will cover things such as having a strong password this means having a good length, complexity and reasonable expiration date to ensure the password is consistently changing. A policy should also cover proper encryption techniques and should not be utilizing techniques such as WEP. Primarily though a policy is going to provide the guidelines to ensure employees, clients or end users are aware of their actions to include connecting to an unsecure that does not meet the encryption needs or rogue AP. A policy is going to be the guidebook for users however proper training is the most efficient method to ensure compliance. The next security measure is to ensure when you receive a newly installed router to change the default immediately, this is especially important because of how many wireless routers are being installed everyday whether business or home. If this is neglected to long an attacker can gain access because often time default login and password are generically made depending on the company, I know from experience that when Cox Cable installed there router they gave me a very generic password using the SSID as part of it, luckily they did ask me if I wanted to change it which hopefully everyone is asking as not everyone is keen on wireless. The same goes for the generic SSID given when the router is installed which could give a knowledgeable attacker insight into what type of router and if any vulnerability is associated with it. However if someone is able to gain access before you change it they can the defaults themselves which could access to network freely and effortlessly. The next topic should not have to be discussed in detail has it has been previously mentioned above and that is enabling encryption but since it is reported that some 60-70% of wireless networks established have no security enabled (CWSP: Certified Wireless Security Chapter 6) it goes without saying that enabling security will limit your footprint to an attacker. As previously discussed we went over the three encryption techniques WEP, WPA and WPA2 and the specifications of each. While WEP is better than none it is still inherently weak and can be cracked in minutes if not sooner so it is recommended to use WPA2, while it can be cracked it does take a considerable amount of time and combining WPA2 with a strong complex...

Find Another Essay On Wireless Security and Privacy Protocols Part 2

Privacy and Security Issues in Data Mining

2342 words - 10 pages , Australia, 2006. [3] B. Thuraisingham. Data mining, national security, privacy and civil liberties. In ACM SIGKDD Explorations, Volume 4 Issue 2, page 1-5. New York, 2002. [4] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology. Ethics & Behavior, 7(3): 207-220, 1997. [5] J.S. Fulda. Data Mining and Privacy. In R. Spinello and H. Trvani, editors, Readings in CyberEthics, pages 413-417. Jones and Barlett

Privacy and Security Issues on Facebook

2038 words - 8 pages Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named

Threats to Internet Privacy and Security

950 words - 4 pages The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Privacy and Security in Social Networking Sites

1918 words - 8 pages In today’s society, privacy, security, and convenience has turned into a paradoxical issue dealing with the information age (Barnes, 2006…). In fact, one of the primary driving instruments are the usage - and rise – of social networking sites such as: Facebook, Myspace, and Twitter. Having said that - and considering these networks gather considerable amounts of information about its users, the idea of securing your information is momentous

Finding the Balance Between Privacy and Security

1535 words - 6 pages struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point. While FISA, in reality, did not do much, it did set a precedent for later acts. Its wording was built on over decades, slowly evolving it into something eective. As time went on, technology expanded even more. With the creation of the Internet, and other technological

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and

National Security Agency, Privacy and Security for American Citizens

882 words - 4 pages Background The National Security Agency was established in 1952 from the National Security Council for the purposes of intercepting foreign radio communications (Howe, p 11). Since, the NSA has been one of the most secretive institutions within the intelligence community. However, recent events have focused on the NSA’s domestic surveillance, encouraging a debate between security and privacy. In 1978 the Foreign Intelligence Surveillance Act

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages Guide to Harnessing Technology - Version 2.0. Muller, D. H. G., & Ullmann, W. S. M. Security in Pervasive Computing. Liu, L. Y. (2003). Security and privacy requirements analysis within a social setting. Requirements Engineering Conference Proceedings. 11th IEEE International, 151-161. Prabhakar, S. P. (2003). Biometric recognition: Security and privacy concerns. Security & Privacy, IEEE, 1(2), 33-42. Prandini, M., & Ramilli, M. (2012). A Model

Virtual Work, Security, and Privacy IAAS 600 Research Paper

1009 words - 5 pages identifies the following telecommuting security risks. She first asserts that when workers perform job functions outside of the organizational facilities, a major concern is technologic based security risks and that the highest priority of the organization should be its network security, data integrity, and privacy protections. She further dictates that organizations must, in all cases, have drafted, instituted, and enforce an acceptable use policy

Virtual Work, Security, and Privacy IAAS 600 Research Paper

1215 words - 5 pages Management) website: http://www.opm.gov/policy-data-oversight/performance-management/reference-materials/more-topics/effective-performance-management-doing-what-comes-naturally/ Risk at home: Privacy and security risks in telecommuting [PDF]. (n.d.). Retrieved from https%3A%2F%2Fstartpage.com%2Fdo%2Fsearch&mtflag_ac=0&mtabp=-1&mtcmd=process_search&mtlanguage=english&mtenginecount=1&mtprf=239eac1d5ec3618a152897bad2fede7c&mtcat=web&mtlui=english

Similar Essays

Wireless Security And Privacy Protocols Part 1

2617 words - 11 pages important wireless security is we can dive a little deeper into just how we are going to go about securing our network. There are several privacy protocols used for IEEE 802.11 to provide wireless LAN protection against eavesdroppers but first we will discuss the first technology WEP (Wired Equivalent Privacy) and its characteristics. WEP was designed to provide wireless security by encrypting the data sent over radio waves so that it is protected

Internet Privacy And Security Essay

1113 words - 5 pages smartphones were returned even though all of them contained owner contact information, and 75% of smartphones owners do not password protect their phones (2012 Info-graphic Highlights). These statistics above only prove the importance of security on the internet. We all have to do our part in protecting ourselves when online. Privacy and security on the internet are both supported by our ability to protect our own personal information when

E Commerce: Security And Privacy Essay

2129 words - 9 pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through

Security And Privacy In Social Media

1797 words - 8 pages this will happen in the near future. (Denning 102) Another possible solution could be the building of personal privacy software made available to individuals. This software would include a small plug-in type device used in homes. The device could keep all networking communications private and let users surf the web without being monitored by others. This could possibly replace the wireless router, or become a part of the routers used today. It