This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

research on wireless networks

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

research on wireless networks

Introduction.

Several standards are in place to assist secure wireless networks. However, weakness still exists and manipulated by naughty people. This research on wireless networks will help me to understand the reason for high cases of cyber-attacks and, after that, come up with a solution. This paper will explain the origin of cyber-attacks on wireless networks, destructive attacks that have been experiencing, types of attacks, prevention measures, reasons for the attack, and the benefit accrued to cyberbullies.

People have moved from wired technology to wireless, which has experienced a lot of negativity in terms of security; some major security setbacks experienced by wireless networks are attacks. There have been three significant attacks, which include; Wired Equivalent Privacy standard attack, Wi-Fi Protected Access – Temporal Key Integrity Protocol, and Key Reinstallation Attack. However, some attacks have been devastating, such as WannaCry 2017 and Equifax 2017. Attacks such as packet sniffing, evil twin, jamming networks, WEP/WPA, and password theft are modern-day attacks.

Because of security weakness, and the ease of manipulating them, wireless attacks has become rampant. Most of these attacks were due to information theft, monetary gain, leaking information, fun, and politics. Moreover, the benefits of these attacks include; gaining financial stability, improving the status, progress skills, and acquiring knowledge.

The attacks can be prevented by installing security updates, Verification Methods, Encryption, Use of VPN, and Verifying Devices on Network.

Conclusion

The wireless network carries on to be universal. Therefore, it is necessary to address the security concern that has been raised frequently. Furthermore, people are inspired to find vulnerabilities in the current standards due to the benefits of attack. Therefore, I recommend individuals and organizations to employ better mechanisms to improve data and network security.

 

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask