Premium Essay

Wi-Fi Security

In: Computers and Technology

Submitted By Imtired
Words 584
Pages 3
Wi-Fi is growing rapidly in mainstream America.
It seems that everywhere I go, there is a sign posted

offering "free Wi-Fi". Are these so-called

"hotspots", as secure as they are handy? Or, are hackers

somewhere lingering waiting to take advantage of some

unsuspecting user. Although wireless networks are

convenient, they may not necessarily be secure.

I use Wi-Fi at home and it seems to work for

my family and me. My main concern when it was

purchased was speed. However, now that time has progressed,

I have become quite concerned about its security. Through

further research, I found that I some experts suggested that

Wi-Fi is safe, secure, and needs only normal security settings.

While some experts say that Wi-Fi poses great risks to one's

internet security.

A wireless network functions by sending information

through radio waves. This makes it easier for someone to

intercept. Piraters do not have to be near you to pick

up and intercept a signal. One way I have found that this

is often done is on wireless peer-to-peer networks. Which

is mainly at those ever so convenient public hotspots. Frequent use of public hotspots promote very high security

risks for PCs as well as personal information stored on the

PC. Constant precautions have to be maintained when using

a wireless connection. To start, a strong password comes

highly recommended. As well as constant up keep on your

security software. Don't have a default wireless

connection site setup on your laptop or PC. Do not use

peer-to-peer wireless connections. Always disable your

wireless connection when you are not using it. Keep your

firewalls enabled.

Wi-Fi has its rewards. It is inexpensive

and easy to hook up. Public hot spots are easily…...

Similar Documents

Free Essay

Industry Analysis: Li-Fi

...Industry Analysis: Li-Fi T able of Contents Table of Figures ............................................................................................................................ 2 Table of Tables ............................................................................................................................. 2 Executive Summary ...................................................................................................................... 3 Introduction................................................................................................................................. 4 Li -Fi Technology Assumption ..................................................................................................... 4 Report Scope ............................................................................................................................ 4 Report Structure ....................................................................................................................... 4 Chapter 1 UK Broadband Industry.................................................................................................. 6 Current Technologies ................................................................................................................ 6 Current Market & Key Competitors ............................................................................................ 7 Future Market ...................................................

Words: 6146 - Pages: 25

Premium Essay

Mobile Security

...WHITE PAPER Copyright © 2011, Juniper Networks, Inc. 1 MOBILE DEVICE SECURITY— EMERGING THREATS, ESSENTIAL STRATEGIES Key Capabilities for Safeguarding Mobile Devices and Corporate Assets 2 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Mobile Device Security—Emerging Threats, Essential Strategies Table of Contents Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 3536 - Pages: 15

Free Essay

Wi Fi Sector

...Interference Mitigation in WiFi Networks using Multi-sector Antennas Henrik Lundgren† , Anand Prabhu Subramanian‡ , Theodoros Salonidis† , Marianna Carrera† , Pascal Le Guyadec† † Thomson, Paris, France ‡ Stony Brook University, New York, USA ABSTRACT Sectorized antennas provide an attractive solution to increase wireless network capacity through interference mitigation. Despite their increasing popularity, the real-world performance characteristics of such antennas in dense wireless mesh networks are not well understood. We demonstrate our multi-sector antenna prototypes and their performance through video streaming over an indoor wireless network in the presence of interfering nodes. We use our graphical tool to vary the sender, receiver, and interferer antenna configurations and the resulting performance is directly visible in the video quality displayed at the receiver. Categories and Subject Descriptors C.2.1 [Network Architecture and Design]: Wireless Communication; C.4 [Performance of Systems]: Measurement Techniques We have developed a demonstrator that complements our previous measurement campaigns [3, 4] and its primary goal is to demonstrate the operation, the challenges, and the resulting performance of sectorized antennas in real-world dense 802.11 wireless mesh networks. We have designed a four-sector antenna [2] for operation in the 5GHz band with off-the-shelf 802.11 wireless cards. We equip a number of wireless nodes with these antennas......

Words: 1079 - Pages: 5

Premium Essay

Wi-Fi

...Meaning: Wi-Fi - is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. Facebook - is a social networking service launched in February 2004, owned and operated by Facebook, Inc. Social networking sites - A Web site that provides a virtual community for people to share their daily activities with family and friends, or to share their interest in a particular topic, or to increase their circle of acquaintances. Purpose: Wi-Fi - It also allows you to use the resources of one computer from another. I use the printer attached to one of the desktops at home to print from this notebook. Saves hooking up any wore here at home. I also use the desktop as a warehouse for pictures and such for the notebook. Facebook - To keep in touch with friends, and keep your pictures and share pictures with other people. Social Networking sites - Social networking sites are not only for you to communicate or interact with other people globally but, this is also one effective way for business promotion. A lot of business minded people these days are now doing business online and use these social networking sites to respond to customer queries. It isn't just a social media site used to socialize with your friends but also, represents a huge pool of information from day to day living. Advantage: Disadvantages: Wi-Fi - Advantages: * Flexible if there is ad-hoc situation when......

Words: 573 - Pages: 3

Free Essay

Evolution of Wi-Fi

...The Evolution of Wi-Fi Charles Williams Albert Acuna ISSC340 American Military University Abstract From the creation of the IEEE standard in 1997 to current times Wi-Fi has evolved dramatically over the years. An idea to provide connectivity to devices with the absence of cables was adopted globally. Each year brings about new ways of utilizing wireless technology. This study aims to cover Wi-Fi from inception to present day and prospects for the future. The Evolution of Wi-Fi What exactly is Wi-Fi? A popular misconception is that Wi-Fi stands for “wireless fidelity”, however, it can be described as, a technology that uses radio waves to provide internet and network connectivity. The Wi-Fi Alliance, a non-profit organization founded by six companies in 1999, defines Wi-Fi simply as “connectivity”, connectivity in a way that provides freedom and the ability to move about without being tethered by cables, or stuck at a workstation. Wi-Fi symbolizes the ability to transfer data from one source to the next via a wireless link. Any product that houses the radio technology 802.11, a standard that has received widespread adoption, is considered a wireless device. The standard was developed in 1997. Fathers of Wi-Fi With any popular invention or supposed novel idea controversy seems to always linger in the background. When we think of the printing press we think of Johannes Gutenberg, however roots of printing with movable type can be traced back 350 years......

Words: 3375 - Pages: 14

Free Essay

Starbucks Introduces Wi-Fi

...service provider, to enable Starbucks’ customers the ability to drink their coffee and eat their food while using their laptops, PDAs and other devices to access the Internet (Henderson, 2001, pg. 66). This Wi-Fi capability also enabled Starbucks’ managers and employees the ability to run the business and their specific locations more efficiently and effectively. As of 2003, Starbucks reported that they already offered wireless Internet service in most of their stores within the United States and plan to offer Wi-Fi in 2,700 locations by the end of 2003 (Hartnett, 2003, pg. 62). Wi-Fi’s Value-Added Benefits Starbucks is seeking the opportunity to, “keep butts in seats for the opportunity to serve up a second cup of Joe.” (Powell, 2003, para. 3.) Attracting customers is one of the primary concerns for any business. Offering wireless Internet connections within their locations enables Starbucks to attract customers in another manner, rather than the direct coffee and snack avenue, while simultaneously keeping their customers in the locations longer than normal. Starbucks not only views the Wi-Fi introduction into their locations as a way to keep their customers coming in, but also as a way to operate their business more efficiently. Starbucks is utilizing the Wi-Fi capabilities to allow their employees, especially store managers, to access applications and databases to streamline hiring, sales, inventory handling and various other tasks to enable managers to work......

Words: 988 - Pages: 4

Free Essay

What Is Wi-Max

...What is Wi-Max? University of Maryland University College of Asia Alvin William DeMore Introduction An explosion of mobile, wearable and traditional computing devices across the world, and their interconnections, has made computer security an area of paramount importance. Security is required for the computing host, applications running on it and the data being processed or exchanged between different applications or different hosts. In the security context, an application can be thought of as any executing thread or process, a host contains all such processes, and data is any information asset that can be accessed by an interactive user (Price, 2008, p. 170). A comprehensive definition of information security (IS) was given by the Committee on National Security Systems (CNSS): it is the protection of the critical elements of information, including usage, storage and transmission through systems and hardware components (Whitman & Mattord, 2012, p. 8). According to this model, IS has many aspects, such as physical protection of assets, protection against passive or active attacks, access control, risk minimization and assessment of threats and vulnerabilities (p. 11). Computer security is indeed a vast subject, and out of this I picked the specific subject of latest Wi-fi innovations. The reason is that wireless networking is being used more and more to connect various mobile devices and appliances, and I......

Words: 1770 - Pages: 8

Premium Essay

Security Evaluation Report

...Information Security Article Evaluation Nelson Okubasu CMGT/441 12/3/2014 MARJORIE MARQUE Can We Sniff WI-Fi?: Implications of Joffe v. Google Google collected information between 2007 and 2010 both in us and oversees. In 2010 a law suit was filed against google for violating the federal wiretap act. Among the first of the cases to rule on intercepting unsecured Wi-Fi communications. As of today our society has become so dependent on using Wi-Fi communications for various aspects of our lives, there is a parallel expectation of privacy. At the same time there are so many people or users out there who don’t understand how Wi-Fi technology works, if their information is secure, whether there privacy is violated or if the government has the right law in place to protect them. The fact that users do not fully understand Wi-Fi technology and the shortcomings of current security mechanisms is not a justification to violate their privacy, but instead to call on the government to enact or amend the Federal Wiretap Act (FWA) to reflect their reasonable expectations. Clear statutory protections will allow for the continued progression of Wi-Fi technology. Society’s dependency on Wi-Fi networks and public hotspots both economically and personally requires expansion of the FWA to ensure national uniformity. Essentially, the court found that even though Wi-Fi networks do transmit data using radio waves, the uses of Wi-Fi......

Words: 1058 - Pages: 5

Premium Essay

Security

...Identifying Potential Malicious Attacks, Threats and Vulnerabilities Jordan Treichler Strayer University CIS333 Professor Roden February 1, 2015 Identifying Potential Malicious Attacks, Threats and Vulnerabilities Introduction From an Information Security Engineer's point of view, a videogame development company has many resources, sensitive data and intellectual property which must be safeguarded. The existing network is comprised of two firewalls, one external firewall housing the entire network, one web and FTP server, one email server and one IDS on the DMZ. The second of the two firewalls (internal) protects the WAP, two Windows Server 2012 Datacenter, three file servers, one hundred workstations and the VoIP telephone system (see example below). There have been reports of malicious activity being on the rise; this document will outline the three largest security concerns for the company as a whole. These security concerns consist of employees and workstations, the Wireless Access Point (WAP), and the email server. Employees and Workstations One is led to believe that the malicious attacks are coming from within the company. Historically, there have been multiple instances of this vary action. Take Bradly Manning for instance, Manning was privileged to access classified information not to insert a CD-R and steal classified documents. If a user means harm, allowing mobile devices in the workplace only acts as an aide to them. Had Manning not been permitted......

Words: 1208 - Pages: 5

Free Essay

Make Wi-Fi Faster

...Make a wireless network faster There are many ways to improve Wi-Fi network speed, such as placing the router in the center of the area you want it to cover, keeping the router away from metal objects that could block the signal, or making sure there aren’t too many other radio-enabled devices broadcasting on a 2.4GHz signal, which is standard for a lot of older routers. Some other suggestions: 1. Check your speed. Checking the speed of the connection will let you know for sure whether or not your system is within range of the speed the ISP promised. A speed test is easy to find online. SpeedTest.net and TestMy.net are good sites to test one’s broadband speed. 2. Change the channel. If you have an older router, and its signal is seeming weaker than it should be, you can try manually adjusting the broadcast channel to find one with less number of wireless routers competing for space. If your router is newer and automatically chooses which channel to broadcast from, then you won’t get too much use out of pinning your wireless down to a single channel. How to change the channel: First, go into the router’s graphical user interface (GUI), by typing the router/gateway address into the address bar in a browser window while your computer is connected to the router’s wired or wireless network. The router’s address is usually found on the router itself, in the instruction manual, or online if all else fails. If you have a D-Link router, you’ll type http://192.168.0.1; if you......

Words: 428 - Pages: 2

Free Essay

Voip and Unified Communications Via Wi-Fi Handset

...Title Advancement of VOIP and Unified Communications via Wi-Fi Handset “The technology involved in VoIP software and VoIP information is forever changing and updating”(VoIP Telephony Updates… 2008 -5). Abstract This paper gives the information on the VOIP-voice over internet protocol which is the technology that is been used for the voice communications by using the different types of the IP based networks in order to deploy the devices of the VOIP users. The VOIP technology is having different types of the security issues in the VOIP and Wi-Fi along with the security measures. This paper will deal with the VOIP technology, unified communications and Wi-Fi handset. Table of contents Chapter 1 Introduction to the research………………………………………………………………6 1.1 Aim 1.2 Objectives 1.3 Introduction 1.4 VOIP deployment 1.5 The threats and attacks in the VoIP System 1.5.1 Spoofing 1.5.2 The interception or eavesdropping 1.5.3 The denial of service 1.5.4 The spam over VoIP Chapter 2 Literature review……………………………………………………………………………10 2.1 The security methods 2.2 Call Setup and VoIP Registration 2.3 The Protocol selection 2.4 The Mobile VOIP 2.5 The VOIP handset 2.6 The IP telephony 2.7 The Protocols of VOIP Chapter 3 Research Methodology……………………………………………………………………….15 3.1 Introduction 3.2 Research methodology chosen 3.3 Qualitative research methodology 3.4 Quantitative research methodology 3.5 Research design: Case study approach 3.6 Case study......

Words: 10967 - Pages: 44

Free Essay

Economic Analysis of Gogo’s in-Flight Wi-Fi

...Case Study: Economic Analysis of Gogo’s In-flight Wi-Fi November 2, 2015 Introduction Gogo pioneered and now dominates the in-flight Wi-Fi business, which allows passengers to access the Internet during their flights. In recent years, consumers have grown from anticipation to dislike towards Gogo’s services due to its steady increase in fees and rapid decrease in speed. Through a dynamic pricing strategy they hope to relieve congestion which indeed have effect, but will not last in the fierce competition of an oligopoly market structure. Unlike its monopolistic position before, Gogo now faces at least three companies—ViaSat, Global Eagle Entertainment, and Panasonic— swiftly eroding its market share with cheaper and faster in-flight Wi-Fi services using satellites instead of antennas. Gogo’s own next-generation technology 2Ku, to come online in 2016, uses satellites that hopefully would achieve better prices with higher speed. To analyze the market for in-flight Wi-Fi and the pricing strategies of Gogo, our paper will discuss five core areas:      The price elasticity of demand for Gogo’s service, and how it varies with price levels The market structure Gogo is operating in Its dynamic pricing How the demand for in-flight Wi-Fi has changed over time, technological changes over the past 15-20 years that has affected demand Technological factors that affect supply, how congestion affects pricing and our recommendation Price Elasticity of......

Words: 3379 - Pages: 14

Premium Essay

The Future of Super Wi-Fi

...The Future for Super Wi-Fi By Chris Riley What the heck is super Wi-Fi anyway? First let us explore the history of wireless communications. In 1747, Benjamin Franklin proposed that electricity could move through air. In 1819, Danish physicist Hans Christian Oersted noted that a compass needle moved in the presence of an electrical field. Michael Faraday demonstrated the first electromagnetic induction and built the first direct current generator in 1831. In 1865 and again in 1873, famed Scottish physicist James Clerk Maxwell published multiple papers regarding electromagnetics. Alexander Graham Bell and Charles Sumner Tainter invented the photophone in 1880. The photophone was a telephone that conducted audio conversations wirelessly over modulated light beams, which required a direct line of sight. In 1885 Thomas Edison used a vibrator magnet for induction transmission. In 1891 he filed a wireless patent for the signal system and method using inductance he applied to the Lehigh Valley Railroad system he established in 1888. In the meantime, Henrich Hertz demonstrated the existence of electromagnetic waves with an oscillator. Then came what is perhaps the most debated topic in wireless history, the invention of the radio. WiFi has easily been one of the most useful technologies of the past decade so many of our daily tasks and the devices we use rely on it, and it’s on the verge of getting a whole lot better. First, it's not as new as it might sound...

Words: 722 - Pages: 3

Premium Essay

Information Technology Management - in What Ways Is the Wi-Fi Technology Changing the Life of Dartmouth Students Relate Your Answer to the Concept of the Digital Society

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 Information Technology Management 1. In what ways is the Wi-Fi technology changing the life of Dartmouth students? Relate your answer to the concept of the digital society. 2. Some say that the wireless system will become part of the background of everybody’s life—that the mobile devices are just an afterthought. Explain. 3. Is the system contributing to improved learning, or just adding entertainment that may reduce the time available for studying? Debate your point of view with students who hold a different opinion. 4. What are the major benefits of the wireless system over the previous wire line one? Do you think wire line systems will disappear from campuses one day? (Do some research on the topic.) 1. IVR systems are still popular. What advantages do they have over even older systems in which the reps mailed or faxed reports? 2. Summarize the advantages of the new system over the IVR one. 3. Draw the flow of information in the system. 4. The existing technology enables transmission of data any time an employee can access the Internet with a wire line. Technically, the system can be enhanced so that the data can be sent wirelessly from any location as soon as they are entered. Would you recommend a wireless system to Maybelline? Why or why not? 1. What were the drivers of SPRS? 2....

Words: 749 - Pages: 3

Premium Essay

Computer Security

...Computer Security Protecting Your Computer System Do’s and Don’ts Abstract This paper explores the computer security process of preventing and detecting unauthorized use of computers. I will also discuss: A. The prevention measures (do’s and don’ts) to help you stop unauthorized users (also known as “intruders”) from accessing any part of your computer system. B. Detections methods that help you to determine whether or not someone attempted to break into your system; a. If an attack was successful b. If so, what they may have done.   Computer Security Protecting Your Computer System Do’s and Don’ts We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications “top secret,” you probably do not want strangers reading your email, using your computer to attack other systems, sending forged emails from your computer, or examining personal information stored on your computer (such as financial statements). Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems. Once an intruder takes control of your computer, they have the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you......

Words: 1909 - Pages: 8