Security And Risk Management Technology Essay Paper (Essay Sample)
I was to Conduct some research of "war driving" (detecting Wireless access points) and exploits in Wireless encryption techniques (cracking a Wifi password).source..
Security and Risk Management
The advancement in technology has enabled the development of key industries in the world such as communication. When the internet was first introduced in 1985, no one had it in mind that it would be a necessity twenty years later. Through internet connections and advanced networking, communication is now a click of a button. Organizations, through Local Area Networks (LAN), can now create their own networks which have internet access for fast, reliable and secure communication. On the downside though, as advancements in networking and the internet continue, so do the brilliance of hackers and malicious individuals. In the past two years, there has been a tremendous increase in the number of cyber-attacks, some so big that they almost brought organizations crumbling down.
Wardriving and cracking of WI-FI passwords are two critical threats to the security of a network. Both are simple to achieve and amateur hackers can easily obtain a company’s methods using these two techniques. Although there are security measures that companies and individuals use, most of them are basic encryption techniques that are easy to bypass. Recommendations have also been discussed on how network security can be enhanced.
Wardriving also called access point mapping, is a technique whereby, WI-FI networks are marked by individuals driving in a car. This is usually performed in cities and towns where most organizations within a building have their own LAN and with advanced technology in networking, their connection can reach beyond the building. Wardriving is a concept that can be exploited by hackers since it is not illegal as per se. In most countries, a wardriver is expected to seek permission from local authorities and data obtained must not be used to exploit the studied groups.
Apart from identifying a location and seeking permission, an individual has to arm himself or herself with the relevant equipment for a successful information collection routine. A laptop or Personal Digital Assistant (PDA). Software such as Network Stumbler (Windows), iStumbler (Mac OS), Barbelo, Kismet and Kismac. Other necessary equipments include a network card, an antenna mounted on the car roof and a GPS receiver (Shah, 2014).
- Benefits And Challenges Of Digital Freelance Work For A UniversityDescription: This study is meant to provide an overview of the freelancing field by students who are university graduates as a way of self-employment. It also provides the challenges and benefits that come with digital freelancing....5 pages/≈1375 words| 5 Sources | APA | Technology | Essay |
- Hazards Of Electricity And The Need For Proper Handling ElectricityDescription: Hazards of electricity and the need for proper handling electricity when using it to avoid risks associated with it. As such, a hazard can be explained as anything that can act as a potential or actual threat the welfare of equipment, people, environment or machinery....6 pages/≈1650 words| 3 Sources | APA | Technology | Essay |
- How The Airlines Can Cut Their Overall Operational Repair CostsDescription: The task involves analyzing the costs in the aviation industry. Each of these costs has to provide possible means to reduce the overall operating costs. The sample paper clearly presents these costs, identifies the critical ones and how the airlines can reduce their overall operational costs....3 pages/≈825 words| 4 Sources | APA | Technology | Essay |