Thursday, May 9, 2019
Wireless security Essay Example | Topics and Well Written Essays - 500 words - 2
receiving set valueive covering - Essay ExampleThe activities performed by exploiter on the internet fucking be both(prenominal) casual and confidential in nature. None the less for any of the activities performed over the internet every user wants privacy and security. Security of the connection ensures the integrity and originality of the data and assures the user that his information is safe. Wireless connection hire the use of radiowaves for communication and flow of data between the devices. These radiowaves can easily be tapped, intercepted and the information can be read or stolen and even in some case altered and manipulated hence face lifting the concern of data integrity and originality.Facing the threats that came with the increasing and rapid growth in the number of users of radio set technology the requirements for development of measures for security and integrity of data and network also arose. Although number of people were vacant and most of them were unawa re of the security threats they faced using wireless form of connections, such people were plainly concerned about the availability of the internet and were satisfied as long as they were able to lean the internet. Now to ensure security while using wireless connections various forms of security were developed which include WEP,WAP and WAP2 etc.WEP - Wired Equivalent Privacy (or Wireless Encryption Protocol), was introduced as the first line of security to tackle the threats that were occurring. It was a weak option for security as it precisely had encoding to a radical level. After the passage of time a lot of weaknesses were found in it and did not remain as secure as it was thought earlier. It did not provide end to end protection as it only used at the two lowest layers of OSI. Later on it was found out that it didnt protect packets from being intercepted and any hacker could get enough stream of packets which would be enough for him to extract the encryption scheme.After s ignificant flaws were found in WEP another technology WPA
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.