Wireless-Security

Wireless is the current standard for tablets, laptops, mobile devices and many of the available smart devices around the world. The current state of wireless security is better than earlier models, but not perfect. Take a look at the top applications and techniques used by today’s hacker.

http://resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/#gref

Although wireless networks offer great flexibility, they have their security problems. A hacker can sniff the network packets without having to be in the same building where the network is located. As wireless networks communicate through radio waves, a hacker can easily sniff the network from a nearby location.

Most attackers use network sniffing to find the SSID and hack a wireless network. When our wireless cards are converted in sniffing modes, they are called monitor mode.

Watch the following video.

https://www.youtube.com/watch?v=kpI3fQjf43E

Obviously, networks should avoid using WEP security keys to secure networks. For this discussion, address the following:

  • Discuss why WEP is invalid for use–and not acceptable for protecting sensitive information.
  • Given that the current status of key generation for WPA and WPA2, what further steps are needed to secure networks from threat actors?
  • Discuss potential issues with the current state of wireless keys, SSID’s and how threat actors can get rogue access points and spoof MAC addresses to gain entry inside the wireless domain. Be sure to outline threats both internally and externally. You should also seek to discuss countermeasures against these threat actors.

In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per academic writing standards and APA style guidelines.

From Book: Oriyano, S. P. (2014). Hacker techniques, tools, and incident handling (2nd ed.). Burlington, MA: Jones & Bartlett Learning. ISBN-13: 9781284031713

Chapter 8 in Hacker Techniques, Tools, and Incident Handling

Required:
370 word (Half page)
2 credible scholar source
15% similarity allowed.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.