Wireless Networks Security Privateness And Ethical Issues Computer Technology Essay

Wireless area systems (WLANS) have been increased substantially increased in every area such as educational companies, homes public areas and businesses wireless based on the typical 802. 11 are typically used in the organization and environment such as 802. 11b operates at 2. 4GHZ and gives up to 11mbps and 802. 11a provides up to 54MBPS. In such a paper I am going to discus about the cellular network security and privateness issues and the solutions

The 802. 11 standard includes some mechanisms to provide the security of the sent data. So many papers have previously discussed that the mechanisms available are inadequate to supply the security

The problem always with wireless security is the no control on the communication medium. Radio waves do not service where in fact the property lines are drawn. When comes to wired network it uses the physical medium like copper and dietary fiber optic cords these can be much more better to stop the problems on the cables. Wireless sites are are more popular in the last decade. Big company's and basic end users also using every day as a result of local wireless sites: user mobility, simple and fast assembly, scalability and good deal. Wireless geographic area network permit the users to gain access to the network with in the number of the network coverage with no wired network. Data moved using the air waves through the space any consumer can access these by using a radio device. Since there is a problem of the cover of the info. Therefore the mechanisms which is often applied for security for a wired network cannot be applied to wireless networks. It is compulsory there should be a mechanism which may be able to protect and give some privacy

Day by day the numbers of applications that can be reinforced by the cellular technology are increasing. People can gain access to the internet from any general population area such as cafes, airports, hotels etc. There are some personal privacy issues are concern when comes to the public hotpots that are ex: if assume a customer want to generate an account on a website he must give the name and some other personal stats as the above mentioned problems may give an opportunity to get these details to attackers.

networks and information about the protocols which are being used in the network because different protocols provides the several security services so leaking the protocol information could cause big problem to the network

Eavesdropping is technique which is utilized to tack the UN-encrypted wireless sessions that the data can be extracted which is utilized for the dangerous types and another kind of the eavesdropping is known that the attacker injects the packets in the network packets in the network this type of problems happens in the encrypted networks. An attacker injects the packets and obtains the packet in the opposite to understand the encryption techniques and breach the network

The previously listed disorders are mainly afflicted the networks but not the specific users. Once an attacker get access the network then attacker begins another type of threats starts off to being able to access the network devices but sometimes the privileges directed at the resources in the network stops the attackers to access the resources

Another kind of attack would be that the interference the trainings and after that it does not permit the train station to reestablish connection with access point. Compared to the attacker establishes reference to access point. There are two relationships between the AP and both workstations now the attacker workstation can gain access to the communication between your end user and the gain access to point

Confidentiality is the house of the info in general security is essential for the most of the organizations. wireless is the broadcast network to maintain Confidentiality it isn't a fairly easy thing today so many packet analyzers available in the internet which are commonly used to braking the network for example a gain access to point transmitting the 3000 bytes at 11mbps will need 24 little bit space after about 10hours

5

Ethical problems with WIFI Networks

When comes to the wide open network that provides free network associations to search or download etc and using the Gps navigation devices there is no any legal rules are defined to safeguard the privateness however node scanning is not illegitimate in line with the US rules however when comes to the robbing the service or attacking the assistance and robbing the info. When involves the node scanning is the issue of the location of the individual or Gain access to point. it may also gives the issues of the positioning privacy of the user or the location of an access point

In standard breaching the accespoints are used to do the following things

To gain access to the Adult websites or even to inject disease in the network

To grab the bank accounts and the amount of money theft

To get the experience of the hacking

Recently many studies as shown by establishing duplicate access things to find out about the scanning on an average 3 to 4 4 attempts each day tried to gain access to the duplicate gain access to points and lately a experiment in London shown that two friends are trying to rob the credit card details of the clients of the store those were captured after stealing many greeting card numbers

Unauthorized access is causes the ethical problems ex there is absolutely no regulations to act on a person who log onto another's computer an wide open network this circumstance has happened in 2004 in US. accessing the other network or resources with no permission is comes under robbing if suppose using the another person network bandwidth means who owns the network no longer can use the entire bandwidth which is allocated to him it is also comes under the stealing. Gamming thefts' like that it uses the more bandwidth than some other applications people pay money for their network connections. Some individuals can do anything to access the network. Daily people are receiving aware of the problems with the available sites. Now a day's owners of the network placing passwords and applying the security. Hackers still access the internet so are there volume of tools to crack the passwords some websites has been developed to support hacker to supply the basic or default passwords. There are some responsibilities on manufacturers a recent study demonstrates more than 75 % people don't configure the WPA security if providers are not warnings. Where this gives the high level security and the powerful encryption provides the various encryption keys

In this paper I have taken the qualitative method of write this newspaper. In 802. 11 some authentication mechanisms available

Shared key Authentication: In this process authentication process is completed by the response to an effort by the gain access to point which is known as obstacle and response

Open system Authentication: In this approach SSID is used for the Authentication if the SSID is well known gain access to can be granted

Centralized authentication: In this method a server is used for the authentication if the node is authenticated then only it can access the network

Conclusion:

providing the security to cellular networks and presenting the level of privacy to the user can be an big job because showing the security in the wireless means risks in Wireless and wired along and the hazards provided by the newly emerging systems so with the correct risk assessment and the look the network security is the nice way to supply the security to the because when comes to the university the level of security is different and the office buildings and loan company security needs will vary just what exactly come to say that the protocols that are produced by the organizations such as 802. 11 will cover the every end user requirements so in line with the requirement of the organization need to change the security regulations an the wide open systems are always threat to get rid of users because it is extremely hard to provide the security to the every person only way to set-up the security is giving the initial encryption methods to every user which really is a trial. but open networks provides the grater opportunities to the user to hook up all time

Ошибка в функции вывода объектов.