Introduction
For the last few decades, wireless technology has emerged and has been applied in many business and social contexts. This rapid upsurge in the computer, mobile application, and other wireless technologies has universally changed the network security structures in a very dynamic manner. Nevertheless, a sequence of internet attack and deceitful developments on the organization and individual networks has depicted that wireless networks are highly vulnerable to intrusion which is a significant threat that requires attention. The conventional protection methods for wireless networks, such as software encryption and firewalls have now been surpassed due to the rapid development and introduction of new technologies. The vulnerability of the wireless network has led to the infectivity and insufficiency of the wireless network adoption in sensitive applications following the huge number of network intrusion cases. This literature review seeks to explore the already published research studies on the wireless network security domain issues and possible remedies to improve wireless network security.
Cause-Effect Patterns in Wireless Network Security
The wireless signals travel through the atmosphere which increases their vulnerability to interference compared to the wired networks. Interference of the wireless network can have significant negative impacts on the network such as weakening of the signals or loss of information in the information warehouses connected wirelessly (Choi, Muller, Kopek, & Makarsky, 2006). The corporate use of wireless network exposes organizations to significant external threats due to the network vulnerability.
The Need for Wireless Security
Wireless network applications have been adopted in very many business and social applications which poses a significant challenge to data security. For instance, in healthcare, the use of the wireless network to access patient information servers makes them highly vulnerable to cyber-attacks which are on the rise. According to a study by Greengard, (2013), security is one of the most significant challenges which needs to be deliberated in this era of wireless technology. Various contemporary security standards have depicted that security is currently not parallel with the up-surging use of wireless technology. Susceptibility in the prevailing wireless standards usually arises from time to time, which necessitates constant deliberations to enhance and advance the contemporary security measures. Loo (2010), ascertain that wireless networks are vulnerable to various security threats, which hackers have found relatively easy to access and even crack into other connected networks. For this very reason, it is very much necessary for individuals and organizations to be cautious and outline effective wireless security policies that can protect against unsanctioned admittance to vital resources (Herath & Rao, 2009).
Wireless Network Security Threats and Issues
In his study, Dourish et al., (2004) and Mashhour & Saleh, (2013) ascertains that security in wireless networks remains to be a great menace compared to the wired network. In his review, Vakil says that as businesses and people try to link up with their clients through wireless technologies, people can intercept the frequencies and access critical information. He continues to ascertain that if not well configured, signals for these wireless networks can be traced and monitored quite rapidly. Dourish et al., (2004) also identify rogue access points, which can be obtained from the electronic shops and connected without any approval from a business or even home wireless networks. According to him, rogue access is a huge security risk, especially for its lack of market protection against network security attacks. Although wireless technologies come with various benefits such as cost-effectiveness, easy to use and flexibility, Fenz, Ekelhart, & Neubauer, (2011) warns that they come with huge concerns on matters of security and protection from various vulnerability and threats. Their study is supported by that of Gregor & Krone, (2006), which suggests that security threats attached to wireless technologies are both virtual and physical and if not protected, can lead to risks such as information pilfering, hacking or even distortion. Network security threats are usually accidental or even deliberate. According to Fenz et al., (2011) and Greengard, (2013), numerous and common Susceptibilities result from human errors, which usually emanate from mishandling of sensible or confidential data, as well as desecration of the specific regulations. Accordingly, Loo (2010) highlights that the users' obliviousness causes a couple of wireless network threats, reversed attitudes of organizations and the failure to implement security features in the wireless devices by the manufacturers. Consequently, Loo (2010) ascertain that inadequate training resources or minimal support for user's wireless connections both in the public and off-site contribute immensely in exposing to wireless systems security breaching by the hackers.
Herath & Rao (2009), explored various concerns and issues pertaining to wireless networks. Explicitly, the authors expounded on two main categories of wireless security threats; an attack against the security mechanisms and attacks against the elementary concepts such as routing mechanism. The authors expounded that some of the main attacks range from; denial of service attack; Sybil attacks; hello flood attacks; information on transit attacks; wormhole attacks; as well as the sink-hole or the black-hole attacks. Another study by Eric Sabbah et al., (2006) clarified on attacker motivation, susceptibilities and the current loopholes available for hackers. The authors explain that wireless networks are vulnerable to various security threats, which are capable of jeopardizing the achievement of any given wireless system or application. The study continues to elucidate that measures to develop security supports in the wireless networks are deprived mostly because of the inadequate energy, computation power as well as the communication bandwidth.
Wireless Network Users and Policies
Various studies have enhanced people's perception on the use of wireless network security policies. In an assertion to the network security problems, Dourish et al., (2004) tried to provide solutions in a technical and structural approach. However, they clarified that although the user may be saved from the technical burdens which come with wireless networks, they still may encounter snags when new challenges arise. To uphold this assertion, Park & Dicoi (2003) highlighted in their study that the wireless internet users within public hotspots are much more unconscious of the perils they are exposed to, such as hackers who do not necessarily need to be in the same physical setting to access into their network systems. According to the authors, the hackers may not only access the users' information, but also that of the companies they work for, leading to even more breaching menace. Consequently, Nagashree, Vibha Rao & Aswini (2014), explained that novel technological advancements like the Near Field Communication (NFC), which are common in various wireless network technologies are susceptible to compromise by hackers through snooping on the network and therefore leading to pilfering of payment credentials given that the system is typically used for wireless money transfers. In their study, Lapiotis, Kim, Das, & Anjum (2005), ascertained that the significant developments aimed at combating unsanctioned wireless access in organizations are chiefly engrossed on restricting the outsiders and overlooking breaches from the insiders. The authors clarified on the necessity for all organizations to adopt policies on wireless security management as a strategy of addressing organizations on how to resolve the prevailing issues.
In an empirical study conducted by Chenoweth, Minch & and Tabor (2007), whose main aim was to explore the behavior of the users in relation to wireless network security in a university depicted that around 98 of the entire 3,331 personal computers lacked proper configuration of firewalls. Consequently, out of this number, approximately 60 percent of wireless networks had poor authentications and encryptions, from the study conducted by the Panda International. Susceptibility scans also showed lack of firewalls in a number personal computers (Chenoweth, Minch & and Tabor, 2007). The study credited this to carelessness and inattention by some users, and therefore, the study concluded that user behavior is critical in relation to wireless network security.
In another study, Herath & Rao (2009), stressed on the facet of the information technology professionals conforming to the established security guidelines in organizations as well as the technical panels of fortifying the wireless networks. The study also stresses that both the non-experts and the professionals have hugely failed to comply with the laid out policies and rules pertaining to wireless network security. Summers, & DeJoie (2004), clarified that the human facet of security in wireless networks is significant and need to be deliberated on when expounding on the various threats to wireless networks. This study illustrated that there is 80% probability of information leakage in approximately 50% of the studied organizations, which mainly resulted from the connection of deprived and mismanaged access points by careless operatives.
Technical Solutions to Network Security Issues with Wireless Technology
According to Miller (2001), technical resolutions have been established and accessible, to alleviate the perils associated with wireless networks through the introduction of programs such as the Wired Equivalent Privacy Protocol (WEP). Consequently, Arbaugh (2003) expound about the Wi-Fi Protected Alliance (WPA), which was formulated to enrich and improve the wireless network security. According to the author, WPA brought a better resolution to wireless network concerns through the use of the Temporal Key Integrity Protocol (TKIP), which surpassed the Wired Equivalent Privacy Protocol keys to enhance users' discretion. Although these solutions have been found to minimize wireless network security breaches, it is also critical for the wireless network users to change their perception towards a more security-affirmative setting by shifting their attitudes and becoming an important part of the security solution rather than problem creators. Consequently, creating awareness of the change in people's behavior on security issues is also a critical aspect towards alleviating the problem of wireless network security (Durbin, 2011).
As people and organization strive to safeguard their sensitive data and information, to identify interference of data and to limit entree to the ratified persons, it is critical to observe and comply with the outlaid regulations and guidelines (Stamatios & Kartalopoulos, 2008). One primary necessity is that use of proficient algorithms should encrypt vital information that is reserved or dispensed over the wireless networks. Consequently, it is equally essential for the users to validate themselve...
Cite this page
Paper Example on Network Security Issues with Wireless Technology. (2022, Sep 25). Retrieved from https://midtermguru.com/essays/paper-example-on-network-security-issues-with-wireless-technology
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Health Information Technology and Electronic Medical Record
- Essay on the Architecture of the Domains of a Company
- Project Failure Reflection Blog - Paper Example
- Research Paper on Cybersecurity
- C vs JavaScript: Thread Control & Multi-Tasking - Research Paper
- Microsoft Access: Unlocking the Power of Database Management for John - Essay Sample
- Maximising Performance, Speed & Efficiency of MS Access Databases - Essay Sample