Friday, September 27, 2019
Wireless Network Active Attacks Essay Example | Topics and Well Written Essays - 500 words
Wireless Network Active Attacks - Essay Example The best solution to this problem is RF proofing the nearby atmosphere. The use of Wireless technologies is increasing rapidly and Wireless technology is much admired. So companies are exchanging their usual wired networks with wireless - even for non-mobile functions. There have been several warnings from security advisors regarding wireless protocols, Especially for WEP, being disgustingly insecure. Unauthorized access to wireless network can occur from different ways for example, when a user turns on a computer and it latches on to a wireless admittance point from a neighboring companyââ¬â¢s overlapping network, the user may not even know that this has occurred. But, it is a security violate in that proprietary company information is exposed and now there could exist a link from one company to the other. A denial-of-service attack is an effort to make computer resources unavailable to its intended users. It is the malicious efforts of a persons or number of persons to stop a web site or service from carrying out proficiently or at all. One general way of attack involves saturating the target machine with external communications requests, such that it cannot react to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. It normally slows down the network performance. For example speed of opening files and closing files slow down. System will also be unable to access any web site. The bandwidth of a router linking the Internet and a local area network may be consumed by DoS. There are also other types of attack that may include a denial of service as a module, but the denial of service may be a part of a larger attack. Illegal utilization of resources may also result in denial of service. For instance, an interloper can use someoneââ¬â¢s secret ftp ar ea as a place to store illegal copies of commercial software, overwhelming disk space and generating network
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.