Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
19 pages/≈10450 words
Sources:
7 Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Risks of Open Wi-Fi Networks (Essay Sample)

Instructions:

wI-fi Technology. this is about the wireless transfer and communication based on the internet.

source..
Content:

Dissertation:
Risks of Open Wi-Fi Networks
Prepared by:
2 September 2015
Contents TOC \o "1-3" \h \z \u Risks of Open Wi-Fi Networks PAGEREF _Toc379130749 \h 3Introduction PAGEREF _Toc379130750 \h 3Aims and Objectives PAGEREF _Toc379130751 \h 4Literature Review PAGEREF _Toc379130752 \h 7Scope and Constraints PAGEREF _Toc379130753 \h 20Research Methodology PAGEREF _Toc379130754 \h 23Findings: Implementation and Evaluation PAGEREF _Toc379130755 \h 27Survey Findings PAGEREF _Toc379130756 \h 27Qualitative Research Findings PAGEREF _Toc379130757 \h 29WEP Cracking Results PAGEREF _Toc379130758 \h 31Available Solutions PAGEREF _Toc379130759 \h 32Conclusion PAGEREF _Toc379130760 \h 33References PAGEREF _Toc379130761 \h 34
Risks of Open Wi-Fi Networks
Introduction
Wireless networks offer several advantages such as ease of connection, convenience, and reduced cost. People can perform computing tasks on the move and are not restricted by a physical infrastructure. At the same time, the open Wi-Fi network poses some serious risks. Privacy and security are among the major concerns of the open Wi-Fi network. The open Wi-Fi network was developed to provide a wireless network for the transmission of data over radio waves. Unfortunately, the network is not secured which makes the data capable of being intercepted by hackers and other unauthorized persons. The wireless nature of the network means that the hacker does not have to be a part of the organization that provides the network or be connected to the network by physical infrastructure. However, better and more efficient security protocol are being developed to increase the security of data being shared over these networks.
Security arrangements are particularly needed in areas where open Wi-Fi hotspots have been created where users can automatically log into the open Wi-Fi network and transmit data. There is a need for users to develop safe habits for sharing data over the open Wi-Fi network and to ensure that they are completely logged off when not using the network. The main challenges that organizations and users face in terms of network security include privacy, confidentiality, data and system integrity, and the continued provision of service to the users.
The present study discusses the most important security risks associated with the open Wi-Fi network. It mainly explores the extent to which users are aware of these risks and what steps they take to prevent these risks from materializing. The findings of primary and secondary research are integrated to present an overall picture of the situation which is then used to identify the main strategies of minimizing the risks. The paper concludes with a specific recommendation to reduce the security risks of the open Wi-Fi networks.
Aims and Objectives
The broad aims and objectives of this research project are to determine the main security risks of open Wi-Fi networks and the extent to which users of open Wi-Fi networks are aware of those risks. The study aims to review the main threats and the common ways in which those threats are realized by hackers and attackers using various devices and software. On the basis of the findings, the study aims to determine remedies to make open Wi-Fi networks less vulnerable to the identified risks. It aims to recommend the best solution to the problem based on available research and survey findings.
Open Wi-Fi networks are susceptible to a number of risks because of inherent vulnerabilities in the system (Berghel and Uecker, 2005). Weaknesses in the system protocols as well as network devices may pose the system to some inherent risks. These threats can be quite severe considering large companies use open Wi-Fi networks to connect employees within and outside the office. The objective of the current study is to review the most common and severe security risks to which users of open Wi-Fi networks are exposed. Home users as well as corporate users share large volumes of data regularly over the network and hence, this objective will help to make their data more secure from hackers and other intruders with malicious intentions.
In addition to reviewing the main risks and threats to open Wi-Fi networks, this study is also interested in finding out whether users are aware of these risks. Hackers as well as those who stumble upon data shared over open Wi-Fi networks can be prevented from misusing the data if the users adopt safe usage behaviours. As long as users are aware of the most common risks, they can be encouraged to adopt safe practices and working habits to ensure that their data and systems are protected. However, if the users are blissfully ignorant about the threats to their data, it becomes important to educate them about those risks and the damage they can cause to their data. This study will aim to determine the level to which users of open Wi-Fi networks are aware of such risks.
In order to have a better understanding of the main security risks and how they are perpetrated, it would be necessary to understand the basic working and principles of open Wi-Fi networks. Some of the features of open Wi-Fi networks that make them extremely convenient can also be a source of weakness and security threats to the users. Research suggests that the main security risks of open Wi-Fi networks exist because of underlying weaknesses in the structure and protocols on which the network is based (Berghel and Uecker, 2005). Hence, for a better understanding of the security risks and how they are executed, this study aims to identify the main structural factors of the open Wi-Fi network. This objective will enable the study to identify specific weaknesses in the network that can be addressed to minimize the security risks.
Based on the findings of the literature review, independent research and survey results, the study aims to identify specific remedies which can improve the security of the open Wi-Fi networks. Factors such as negligence and lack of awareness among users, slack attitudes and misplaced priorities of the network developers and weaknesses in the legislative areas will be addressed to recommend the most effective and economical remedies to solve the problem for the long term (Jacob, Hutchinson, and Abawajy, 2011). The remedies that have been adopted and implemented in the past will also be discussed in the paper to explore their effectiveness and weaknesses to inform policy in future.
The remedies recommended in this paper will be aimed at helping network administrators to make the open Wi-Fi networks more secure. For instance, by identifying weaknesses and vulnerabilities in the protocol or in the devices used to build the network, the study aims to inform network administrators of the most sensitive areas of the network to enable them to take appropriate action to patch up those areas and make the network security apparatus more robust and effective. It is expected that the discussion of findings and the recommendations in this study will educate network designers and administrators so that they can adapt to better and more effective security measures.
Besides enabling network managers to make the open Wi-Fi networks more secure, the study also aims to make open Wi-Fi users more responsible and aware of the risks to which they are exposed. As people log in to open Wi-Fi networks while commuting or while having a cup of coffee in a cafe, they may not realize that hackers and intruders may be sitting close to them and can gain access to their computer and data stored on it quite easily. The study aims to identify some simple habits which open Wi-Fi users can adopt to minimize the chances of their systems getting hacked.
One of the biggest threats of open Wi-Fi networks is that the data being transmitted over them can be intercepted by hackers. The data can then be used to locate the identity of the system devices which can further lead to criminal and unethical activities that could endanger the safety and security of the user (Choi et al., 2008). The study aims to find ways in which the theft of data can be reduced. During the course of the study, the various devices and software that can offer protection against data theft will be discussed so that they may be adopted by home users.
The study also aims to identify and explain the main methods that hackers use to invade networks and gain access to sensitive data. A number of devices and programs exist on the market as well as online for free download. This study will outline the strategies and tactics commonly adopted by hackers to identify open Wi-Fi hotspots. It will further discuss the techniques by which the hackers are able to identify the weaknesses of the networks and how they are able to divert data from the intended destination to their devices. A discussion of these strategies is included in this paper to acquaint the users and network managers with the modus operandi of hackers so that they may take the security of their networks and data more seriously.
The study will identify some of the commonly used software that enable hackers to pose as genuine users and misuse the data generated by genuine users on the network. It will also describe the manner in which network hackers are able to convert their laptops into access points and gain access to confidential data. The risks posed by such practices will be identified so that readers can take more precautions and engage in responsible practices while using open Wi-Fi networks. It is intended that this information will make home users and corporate users more conscientious and less susceptible to the threats posed by the system.
Finally, the aim of this study is to make specific recommendations about the best solution to the problem of open Wi-Fi security. Based on the findings of the survey and the literature review, it is intended that the recommendations will realistically enable open Wi-Fi users to ma...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • What is the Impact of Information Technology to Social Life?
    Description: The main reason why I have chosen this topic is because there have been a lot of changes in the world of information technology...
    12 pages/≈3300 words| 8 Sources | APA | Technology | Essay |
  • Status Report
    Description: For the last two weeks, I have managed to interact and acquire more friends amongst the employees at the organization....
    2 pages/≈550 words| 1 Source | APA | Technology | Essay |
  • Crime, Surveillance and Technology
    Description: The paper addresses the issues of crime, surveillance and technology with a focus on some tools that can be engaged to reduce crimes...
    2 pages/≈550 words| 10 Sources | APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!