Risks Of Using Vulnerable Wireless Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

CHAPTER 5

The Wi-Fi standard for Wireless LANs (WLANs) is becoming progressively more accepted worldwide for implementing hotspots that provide wireless Internet access in campuses and many other public areas. Wi-Fi enabled network interface cards are now becoming standard equipment for mobile devices such as laptops, PDAs and advanced cell phones. Moreover, low-cost wireless access points (APs) are increasingly used even in households, providing wireless coverage for home networks. This popularity, along with its effortless and economical deployment, point towards Wi-Fi as a technology that will be an integral part of a high-speed wireless broadband prerequisite system with aspirations to demand to the masses.

5.1 HINDRANCES:

Following are the deterrent that we had to face in the completion of the project:

Few areas which couldn’t traverse for scanning. Those are Mubarak Housing Society, Combined Military Hospital (CMH), Airport and those which are under supervision of Army. In the defined areas we were not permitted for scanning of access points. Because of security issues, prohibited areas remain uncovered in our survey.

Networks 500 feet away from the car may not be found for example above 6th floor of any building.

Access points that are deployed behind the walls were not observed.

5.2 CONCLUSIONS:

We interpreted the data to the best of our capability while preserve the secrecy of all gathered information. The outcomes are generalized and no personally specialized information is presented. The purpose of this research and presentation of findings is to help spread public awareness with regards to wireless network security.

The swift implementation of wireless network without a satisfactory increase in wireless network security understanding, both at homes and businesses is looked-for a growing concern. We have assayed to emphasize several risks of employing unsecured or poorly secured wireless networks and some good practices everyone should pursue to ensure a minimum level of security.

5.2.1 Risks of using vulnerable wireless networks:

The use of unsecured wireless networks exhibit users to the subsequent major risks:

• Unauthorized users might visit offensive sites, send intimidating emails and download or post odious material on websites.

• Illegal tricks might be performed from the owner's unsecured network. If there is a consequent criminal investigation, logs will designate that the owner's IP address was used to consign the prohibited activity.

• If folders are shared on the wireless network, they may be accessible to unauthorized users who connect to unbarred wireless networks.

• If the wireless network is connected to the internet, it would be feasible for intruders to access the internet free of charge. Not only would this clog the network but also devour upload and download limits set by the service provider, probably incurring further internet usage charges for the owner.

• Illegal users may sniffle sensitive data such as bank account details, online transaction passwords and email communication transmitted over the unsecured wireless network, possibly causing fiscal loss to the owner.

5.2.2 Wireless network security good practices:

You are strongly advised to protect your wireless network from unauthorized use. The following are some good practices to endow with secure connectivity:

• Ascertain that your wireless access point has the most recent firmware installed (obtained from router manufacturers' website) so that you can acquire benefit of more secure encryption mechanisms such as WPA or WPA2.

• Assure that the SSID of wireless access point is altered from the default manufacturer SSID in order to diminish the risk of intruders directing tormented attacks against your wireless network to take advantage of known vulnerabilities. Further, ensure that your SSID does not expose identifiable information about you or your business.

• Ensure that your wireless access point does not disseminate its SSID.

• Change the default administrator password on the router in order to diminish the risk of concession of your wireless access point.

• Permit WPA2 on your access point with a passphrase having alphanumeric characters and special characters. This might make it more difficult for an intruder to split the passphrase. If your wireless access point does not support WPA2, you must enable WPA or WEP.

• Always activate MAC address filtering to limit the computers which are able to connect to your wireless network.

This study explores various properties of a metropolitan radio map that may affect the security of Wi-Fi network’s performance. We obtained and analyzed citywide Wi-Fi coverage map from war driving. These maps contained thousands of APs and signal samples. A detailed comparison of the selected area of Hyderabad reveals that which area of Hyderabad is densely covered with wireless access points which is already mentioned and described in Chapter 3. After appraising and accumulating all the found wireless access points in Hyderabad, around 5430 access points are encountered. Further it is described in a graph given below:

5.2.3 Wireless Security Survey:

Total

5430

WPA-PERSONAL

1580

WPA2-PERSONAL

3017

OPEN

591

WEP

237

ADHOC

5

5.3 FUTURE WORK:

Future work involves the study of identify the different types of attacks on Wireless networks of Hyderabad. Experimental studies will be conducted in different wireless technologies studying the effect of identify attacks in different scenarios. Best suited encryption techniques would be employed commercially and residentially after the survey results. Wireless Access Revolution Driving frequently called as WAR Driving is a first step towards the deployment of Metropolitan Wi-Fi Network in Hyderabad. Keeping in view the covered area, the metropolitan Wi-Fi network should be deployed in densely populated areas of Hyderabad where the users could take advantage of this service.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now