Wednesday, April 24, 2019
The Hacking Threats and Vulnerablilities of Wireless Networks in Term Paper
The Hacking Threats and Vulnerablilities of Wireless Networks in Organizations - Term Paper ExampleThis increases their chances of interception, disruption and alteration as compared to wired meshs. Confidentiality substructure be highly compromised if the message is not encrypted. This back end allow an unauthorized soul to read the message. Sources of Threats and Vulnerabilities in Wireless Networks In wireless earningss four basic technology components face earnest threats. These are the transmission medium, access points, client devices (for example computers, PDAs) and the clients. Each one of them substructure become a loophole for any or all the another(prenominal) components to be assailed. Unauthorized access to an organizations wireless network can result from an accidental association. This is where someone outside the organization turns their computer on and it connects to the organizations network from a wireless Access Point (AP) (Anthes and Hoffman, 2003). Tho ugh it is not intentional, it compromises on the confidentiality of the organizations information. It could die to a link from one organization to another. Hacking can also be done by tidy sum forming a malicious association. They make their own wireless devices to connect to the organizations network. They use a cracking laptop, called soft AP, to access the organizations information instead using the of organizations AP. ... According to Anthes and Hoffman (2003), hackers can be able to listen to an organizations communications and identify the mackintosh address of the organizations computer. This is called Identity theft /MAC spoofing. Hackers use programs that tend to sniff networks thus gain unauthorized access to an organizations network. They also use some software that makes a computer to pretend to have all MAC addresses required by the hacker. A computer can be enticed to log into another computer that has been set up as a soft AP by hackers. This allows a cracker to l ink to an organizations legal AP using a wireless greenback that offers a continuous traffic flow through the hacking computer (Anthes and Hoffman, 2003). hackers can also utilize lively security faults and abuse of protocols example Extensible Authentication Protocol (EAP) to carry out a de-authentication attack. This is where the organizations computers connected to the organizations AP drop their connections and connect to the soft AP of the cracker. Software such as LANjack and AirJack enhance hacking because they automate multiple steps of the connection process (Clay, 2006). Hackers can launch attacks meant to cut across the organization services through the organizations network. This is called Denial of service (DoS). A cracker leave bombard an organizations AP or network with, premature successful connection messages, bogus requests and other commands. As a result of this, the organization may no longer access their network. The network can also crash as a result of th is (Clay, 2006).Hackers can also inject false network re-configuration commands. This will tamper with the intelligent hubs, routers and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.