Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Wifi Technology Essay Example

Show related essays

Wifi Technology

Wifi Technology. A concept of wardriving exists, where people can roam around with their wireless devices (smartphones, laptops, tablets) and connect to an unsecured network. Wireless security is a big concern of most of the network engineers and analysts, and since the failure of WEP (after it was found to be exploited), the concerns have been raised much higher (District Administration, 2006). It is a fact that WLANs were, are and most of the times will remain an unsecured way of communications as compared to Wired LANs. There are not but many ways to attack and infiltrate a network wirelessly. Criminals generally take a layered approach to infiltrating a wireless network, starting from the outside and working their way in.

To that end securing a wireless network requires a seamless layered approach. A white paper (Motorola Corporation, 2009) released by Motorola Corporation elaborates the tricks of Network Attacks in details as follows: This type of attack is usually aimed at the travellers who are usually on the go and utilize Wi-Fi hotspots to connect with their office which is usually located at a different location usually hundreds of miles away. Hackers will bait the business traveler to connect to a different hotspot, but with the same name. In this way, hackers are actually tricking the victim to connect to the Wi-Fi hotspot which is actually set up by the hacker with malicious intentions. Tools for creating such fake Wi-Fi Hotspots are very easily available over the internet, free of cost or for some nominal price. Hackers actually aim this technique to steal important information which is being transmitted from the victim to the corporate enterprise. Companies should beware of such attacks and utilize VPN (Virtual Private Network) which actually forms a private network within the hotspot to allow safe transmission of data and important information (Motorola Corporation, 2009). This type of attack can be classified as a simple surveillance technique in which hackers usually sniff out unprotected and insecure wireless networks. . Wifi Technology.



Constantin, L. (2011, December 29). Wi-Fi Protected Setup Flaws Make Wireless Network Brute-force Attacks Feasible. Retrieved April 21, 2012, from PC World Business Centre: http://www.pcworld.com/businesscenter/article/247090/wifi_protected_setup_flaws_make_wireless_network_bruteforce_attacks_feasible.html

District Administration. (2006, January 6). Hidden downside of Wireless Computing . Retrieved April 21, 2012, from District Administration Website: http://www.districtadministration.com/article/hidden-downside-wireless-networking

hackosis.com. (2009, October 30). Brute Force Attack. Retrieved April 21, 2012, from hackosis.com: http://www.hackosis.com/brute-force-attack/

Halfacree, G. (2012, February 3). HTC Security flaw in Wi-Fi. Retrieved April 21, 2012, from Expert Reviews: http://www.expertreviews.co.uk/smartphones/1290043/htc-security-flaw-in-wi-fi

Kamisnksy, D. (2012, January 26). How The WPS Bug Came To Be, And How Ugly It Actually Is. Retrieved April 21, 2012, from Dan Kamisnksy's Blog: http://dankaminsky.com/2012/01/26/wps2/

Kerner, S. M. (2012, January 3). Exploit of Wi-Fi Protected Setup Flaw Poses Risks for Consumers, Not Enterprises. Retrieved April 21, 2012, from eSecurity Planer: http://www.esecurityplanet.com/wireless-security/exploit-wifi-protected-setup-wps-protocol-poses-risks-for-consumers-not-enterprises.html

Motorola Corporation. (2009, March). What You Need to Know about WLAN Security? Retrieved April 21, 2012, from Motorola Corporation: http://www.airdefense.net/newsletter/what_need_know.pdf

Nepalese Technology Navigator. (n.d.). Wireless Home Networking with Virtual WiFi Hotspot. Retrieved April 21, 2012, from Nepalese Technology Navigator: http://techsansar.com/internetworking/wireless-home-networking-virtual-wifi-hotspot-2946/

Net Security. (2010, January 21). Analysis of 32 million breached passwords. Retrieved April 21, 2012, from Net Security.org: http://www.net-security.org/secworld.php?id=8742

Netgear. (2008, March 17). What is Wi-Fi Protected Setup? (WPS). Retrieved April 21, 2012, from My Open Router Web Site : http://www.myopenrouter.com/article/10185/What-is-Wi-Fi-Protected-Setup---WPS-/

Prendergast, A. (2004, August 12). Why Wi-Fi? Retrieved April 21, 2012, from Nevada Libraries Web Site: http://www.nevadalibraries.org/conference04/images/Wifi.pdf

Roving Networks . (n.d.). WPS App Note . Retrieved April 21, 2012, from Roving Networks Web Site: http://www.rovingnetworks.com/files/resources/WPS-App-note.pdf

Tech, T. (2011, April). Security flaw in WiFi Protected Setup. Retrieved April 21, 2012, from Windows Secrets Lounge: http://windowssecrets.com/forums/showthread.php/143198-Security-flaw-in-WiFi-Protected-Setup

Viehböck, S. (2011, December 26). Brute forcing Wi-Fi Protected Setup. Retrieved April 21, 2012, from .braindump - RE and Stuff: http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf

WonderHowto. (2012, January 04). How to Hack WPA WiFi Passwords by Cracking the WPS PIN? Retrieved April 2012, 21, from Business Insider.: http://www.businessinsider.com/how-to-hack-wpa-wifi-passwords-by-cracking-the-wps-pin-2012-1

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Agriculture, Military
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Engineering and Construction, Technology
Hire a Writer
preview essay on Wifi Technology
  • Pages: 10 (3000 words)
  • Document Type: Essay
  • Subject: Information Technology
  • Level: Undergraduate
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples