All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Wireless Security, How Secure Are We? Essay Example

Pages: 5

Words: 1316

Essay

This paper examines  the importance  of wireless security.  It answers the critical question of : How secure are we with the wireless security applications we use?  The paper is structured into four main parts: (1) The historical perspectives of wireless security and how this technology evolved (2) The types of wireless technology in force today and the functionality of same (3) The Pro’s and Con’s of Wireless security options and finally (4) The future technological direction of wireless security.

Old hard wired network. 1

Figure 1: Old hard wired network

The Historical Perspective

The wireless network was designed to make enterprise networks have greater efficiency levels. These would be free of the previous hard wired Ethernet cabling systems (Fig 1 refers). This dispensing with the need for cabling, wall switches and installation of network jacks. There always used to be the problems of too few network jacks when you needed them. In particular in the meeting and teleconference meeting rooms.  In this sense the wireless network became liberating, however as the signals passed through the air they became vulnerable to intrusion and as such presented a security risk to the computer systems in the wireless network.  In the last few years security architecture has gone through a number of important changes including ..” incorporate WLANs under already existing VPN umbrellas and to view them merely as an alternative access method — thus preserving existing VPN infrastructure. Another view has been to address the security of the airwaves which has been demonstrated to be extremely vulnerable. The evolution of security standardisation based upon the work of the IEEE has evolved from WEP to WPA”  (Hunt)

Fig 2 illustrates a typical wireless network configuration  with network cards, routers being used to despatch wireless waves between computer devices like PC’s, Laptops, Notebooks, Cell Phones, etc.

Typical Wireless network

Types of wireless security in use today

Before addressing the types of security measures in place over wireless networks, it is necessary to have some understanding of the treats imposed.  These vary from eavesdropping to that of physical intrusion and penetration of your system. Both can be potentially damaging but as a minimum a gross invasion of your privacy.  Threats may be as simples as:

Rogue Wireless Area Networks :  This is where someone may introduce an additional router to your network and thereby gain access to the wider network.  This is essentially a hardware intrusion.  Software applications like Network Magic will detect and report such intrusions to the network administrator.

Spoofing Internal Communications:  This is a direct attack and intervention from outside computers wishing to gain access to your system.  They simulate internal domains and essentially look harmless on the network maps.

Direct Theft of network resources:  This is where your system is hacked and the intruder steals bandwidth to surf the internet.  They can then indulge in a variety of illegal activities that indicates the source as your network.  i.e. downloading pornography, music, video clips etc.  Degradation of your network performance is an indication of this type of attack.

“LAN segmentation is used by many organizations to break the network down into smaller, more manageable compartments. Using different LAN segments or virtual LAN (VLAN) segments has a number of advantages. It can enable an organization to expand their network, reduce network congestion, compartmentalize problems for more efficient troubleshooting, and improve security by protecting different VLAN’s from each other.”  (Bradley)

Whilst segmentation is a useful step you will also require wireless encryption which is essentially a means of preventing eavesdroppers on to your personal wireless network.  The early method used WEP (Wireless equivalent privacy) but this was later discovered to be flawed as anyone who gained the key access could join the network.  It was also easily cracked by professional hackers.  We quickly moved over to WPA (wireless protect access).  This used temporary key integrity protocol and provided a much tougher code system to decipher. Even this was not good enough for large enterprise networks that required a much higher degree of sophistication and security.  This moved us into the real of wireless authentication ” Aside from just encrypting wireless data, WPA can interface with 802.1X or RADIUS authentication servers to provide a more secure method of controlling access to the WLAN. Where WEP, or WPA in PSK mode, allows virtually anonymous access to anyone who has the correct key or password, 802.1X or RADIUS authentication requires users to have valid username and password credentials or a valid certificate to log into the wireless network.”  (Bradley).

Figure 3 Illustration of intruders to wireless network

Cisco systems provide an approach that is designed for the defence of enterprise wireless networks ” Cisco Adaptive Wireless Intrusion Prevention System (IPS) employs network analysis and signature-based techniques to protect against rogue access points and clients, network reconnaissance, eavesdropping, authentication and encryption cracking, man-in-the-middle attacks, wireless DoS attacks, and zero-day unknown attacks. It also provides automated wireless vulnerability and performance monitoring that persistently scans the wireless network to ward off attacks.”  (Cisco)

The major computer manufacturers, software suppliers and communications providers will work with you to provide robust solutions for network security.  One of the main considerations being the architecture itself and no computer wireless network is ever really safe from intrusion.  Ease of access itself represents the greatest security challenge. The very navigation protocols that make it possible for users of a wireless network to find their destination nodes leave vulnerabilities for those who would use the network in an unethical, harmful or illegal manner”  (Malcolm).

Pro’s of Wireless Security Con’s of Wireless Security
Encryptions are sophisticated Any system can be penetrated by determined hackers
Can build self-defending networks People may distribute security entry codes to others
It is scalable – increase security levels that fit your business model Spoofing may occur if the wireless network is not properly monitored
It is layered i.e. multiple lines of defence PC’s are now protected by “all in one” software applications i.e. anti virus, anti spyware, network security, system security, firewalls
It is modular i.e. LAN Segmentation The larger the network the vulnerability increases
Provides network administration function and allows vigilance Makes easier entry point for virus applications

Future of Wireless Security

The more immediate security in wireless will focus upon hand held devices and the more sophisticated wireless cellular phones.  It is highly likely that we will move towards some chip technology that will be built into the hand held mobile devices similar to that built into credit card applications.  This will involve personal identification to the owner of the handheld device with higher degrees of encryption built in for network allowance.  This is already being termed Personal Area Networking or PAN for short.  The objective being to link all of your personal electronic devices like PC, PDA, Printer, Laptop, Fax etc to your mobile phone.  This providing full mobile access to all of your personal data files by your own personal wireless network.  There is no doubt that security issues will still need to be addressed in the new wave of technological developments in this area.

Illustration of Personal Area Network

Works Cited

Bradley, Tony. Secure Your Wireless Network. 6 12 2007. 14 4 2010 <http://netsecurity.about.com/od/secureyourwifinetwork/a/securewifi.htm>.

Cisco. Cisco Adaptive Wireless IPS Software. 2010. 14 4 2010 <http://www-europe.cisco.com/en/US/products/ps9817/index.html>.

Hunt, M. Mathews and R. Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2). 2010. 11 4 2010 <http://www.actapress.com/Abstract.aspx?paperId=30374>.

Malcolm, Jerry. Help Net Security. 2010. 14 4 2010 <http://www.net-security.org/article.php?id=755>.

Figure 1: Old hard wired network. 1

Figure 2 Typical Wireless network. 2

Figure 3 Illustration of intruders to wireless network. 4

Figure 4: Illustration of Personal Area Network. 6

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

The Term “Social Construction of Reality”, Essay Example

The film explores the idea that the reality we experience is not solely determined by objective facts but is also shaped by the social and [...]

Pages: 1

Words: 371

Essay