Wireless Security Measures, Privacy attacks, Policies
In the recent years home wireless threats have become extremely common. In this study we are going to review the risks and types of attacks users should be aware, when using home wireless networks. We are going to determine which type of network is more secure, and how can users protect themselves from privacy attacks. Many programs have already used examples on how easy it is to steal people's credit card information or find out what they are up to. Cyber criminals can simply park down their van outside the person's home and see their screen perfectly. It is very scary; still not enough advice is available from network providers.
In the below study we are going to review wireless networks in general, as well as different security measures, companies should use. By the end of the study we are going to look into policies and procedures, and determine the weak points, causing the most risks. We will finally analyse the security risks, and their consequences.
[...] Customers should be able to contact the support desk for advice. How to change policies to prevent cyber attack Obviously, it is not only the end user's responsibility to stay safe online. Wireless network providers should also ensure they are protecting their customers' data and privacy. The following steps should be made by companies, to ensure they are providing the best advice and support to their users Certifying interoperability of products and technology, to ensure users' security 2. Providing clear instructions with regards to privacy settings and setting up a separate department giving advice to customers regarding to security concerns 3. [...]
[...] (US-CERT, Using Wireless Technology Securely, Produced 2006, Cyber Security Tip) Changing the Password The majority of users keep on using the default manufacturer password. The password should be changed immediately after the purchase, and recommended to be altered every 3 months. Avoiding File Sharing File sharing puts wireless network users into the biggest risk. File sharing should be disabled as default. If the user needs to connect different computers in the house, they should protect the function by a very strong password, containing non-alphanumeric characters. [...]
[...] 33) Conclusion Customers and wireless network providers have a shared responsibility to ensure cyber-attacks can be excluded. However, Internet criminals are ahead of the industry, steps should be made by Governments and service providers to educate Internet users regarding to the risks of wireless networks. Studies and research should be carried out to determine the best ways to make the networks more secure, without making them more complicated or slower. The next challenge the industry is going to face will be 3G systems on Smart Phones and Android phones. [...]
[...] Changes Needed in Wireless Security Measures With the development of wireless technology it is important that network providers are protecting their users from malicious attacks. Developments are needed to ensure that the wireless network of the future is going to be safer and not only faster. That is why providers should invest more in research and analyse security risks. The below study will attempt to outline the guidelines and risks regarding wireless technology. The Outline of the Study In the recent years home wireless threats have become extremely common. [...]
[...] The malicious user might engage in an illegal activity, user the original subscriber's connection. It is very hard to prove that it was not the client who initiated the content or transaction As already introduced in the preface, the technology, malicious users are applying, allows them to monitor the user's activity. This way they are able to steal important personal details and commit fraud. They can get hold of the wireless user's passwords, and use their credit card online, or create a cloned card to use Some Cyber attacks are more direct, and cause immediate damage to the user's computer, files and network connection. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee