Security And Risk Management Technology Essay Paper (Essay Sample)
I was to Conduct some research of "war driving" (detecting Wireless access points) and exploits in Wireless encryption techniques (cracking a Wifi password).
source..
Security and Risk Management
Author:
Institution Affiliation:
Abstract
The advancement in technology has enabled the development of key industries in the world such as communication. When the internet was first introduced in 1985, no one had it in mind that it would be a necessity twenty years later. Through internet connections and advanced networking, communication is now a click of a button. Organizations, through Local Area Networks (LAN), can now create their own networks which have internet access for fast, reliable and secure communication. On the downside though, as advancements in networking and the internet continue, so do the brilliance of hackers and malicious individuals. In the past two years, there has been a tremendous increase in the number of cyber-attacks, some so big that they almost brought organizations crumbling down.
Wardriving and cracking of WI-FI passwords are two critical threats to the security of a network. Both are simple to achieve and amateur hackers can easily obtain a company’s methods using these two techniques. Although there are security measures that companies and individuals use, most of them are basic encryption techniques that are easy to bypass. Recommendations have also been discussed on how network security can be enhanced.
Wardriving
Wardriving also called access point mapping, is a technique whereby, WI-FI networks are marked by individuals driving in a car. This is usually performed in cities and towns where most organizations within a building have their own LAN and with advanced technology in networking, their connection can reach beyond the building. Wardriving is a concept that can be exploited by hackers since it is not illegal as per se. In most countries, a wardriver is expected to seek permission from local authorities and data obtained must not be used to exploit the studied groups.
Apart from identifying a location and seeking permission, an individual has to arm himself or herself with the relevant equipment for a successful information collection routine. A laptop or Personal Digital Assistant (PDA). Software such as Network Stumbler (Windows), iStumbler (Mac OS), Barbelo, Kismet and Kismac. Other necessary equipments include a network card, an antenna mounted on the car roof and a GPS receiver (Shah, 2014).
Other Topics:
- Unit III Journal Entry Hyg Technology Essay ResearchDescription: One of the approaches that have been used to enhance the safety of the employees in the workplace has been job hazard analysis (JSA). Also depicted as the job safety analysis, it has been a technique that tries to ascertain the risks of particular tasks with the aim of reducing the danger of injuries ...1 page/≈275 words| No Sources | APA | Technology | Essay |
- The Evolution of Cyborgs Technology Essay ResearchDescription: Most fictional film lovers and tech gurus by now already understand what cybernetic organisms are. In the star wars trilogy, Darth Vader, born Anakin Skywalker is a cyborg that fell to the dark side of the force and became villain in the Star Wars trilogy, after being rescued by Emperor Palpatine...1 page/≈550 words| 1 Source | APA | Technology | Essay |
- Application: Finding the Length of a Christmas Light on a TreeDescription: Christmas tree is a fir tree that is dressed with light every Christmas. The tree grows and it is pruned (Uszak, 2016). The tree takes the shape of a cone and with lights on, it appears attractive and beautiful. The bulbs are on a single string that winds from the top to the bottom of the tree...7 pages/≈1925 words| 2 Sources | APA | Technology | Essay |