Wireless is the current standard for tablets, laptops, mobile devices and many of the available smart devices around the world. The current state of wireless security is better than earlier models, but not perfect. Take a look at the top applications and techniques used by today’s hacker.
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
Although wireless networks offer great flexibility, they have their security problems. A hacker can sniff the network packets without having to be in the same building where the network is located. As wireless networks communicate through radio waves, a hacker can easily sniff the network from a nearby location.
Most attackers use network sniffing to find the SSID and hack a wireless network. When our wireless cards are converted in sniffing modes, they are called monitor mode.
Watch the following video.
Obviously, networks should avoid using WEP security keys to secure networks. For this discussion, address the following:
- Discuss why WEP is invalid for use–and not acceptable for protecting sensitive information.
- Given that the current status of key generation for WPA and WPA2, what further steps are needed to secure networks from threat actors?
- Discuss potential issues with the current state of wireless keys, SSID’s and how threat actors can get rogue access points and spoof MAC addresses to gain entry inside the wireless domain. Be sure to outline threats both internally and externally. You should also seek to discuss countermeasures against these threat actors.
In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per Saudi Electronic University academic writing standards and APA style guidelines.