software.

Security issues in Wireless networks

Wireless communication/networks provide an advantage of mobility over wired networks. Users can connect with the server of the organization with frequency links of electro-magnetic waves. Since such networks rely on EM waves, it enhances their serving capacity with the mobility feature.

Wireless networks are physically exposed, so the chances of intrusion in these networks are also high. The number of access points is high in wireless networks than traditional wired ones, so attackers keep scanning for those open points to enter the network and disrupt the working.

Some security issues or threats in wireless networks, affecting businesses are:

• Creating Rouge access points: Rouge access points are created within the range of existing wireless LAN. These create an illusion to a node of the network that rouge point is a part of the network and associates with such point. These are short duration attacks which are vulnerable for a short duration of time. Once the attacker associates itself with the physical port of company’s network, they can extend the period of vulnerability.

• Sniffing: Attackers or hackers use software called Sniffer, which allows them to scan the traffic and different access points in a location having many wireless networks. Sniffer helps them find an open unsecured network, which hackers use to latch themselves with.

• Denial of Service: Its simple concept makes it a more renowned security issue in network technology. It needs not access any port or any location in the server of company. Attacker simply overwhelms the network of the company by sending large packets of data so as to slow down the processing capabilities of server. This forces the server to deny the service to be provided to the user. In wireless networks, this is achieved by interfering with the frequency of operation of any wireless network.

• Bluesnarfing and bluejacking: Not only the conventional LANs but the Bluetooth are be used with the intention of data tampering and data theft. Bluejacking allows any unauthorized device to send messages to the device, which could be malicious in nature. Bluesnarfers can steal the data from the device. The most dangerous part of this technique is it cannot be traced if some bluesnarfer steals data from the device.

• Elvin twin: This threat creates a replica of the authorized host at attacker’s point. The authorized access point is blocked by the attacker and user is redirected via another access point under the authority of the attacker. This allows the attacker to control and analyze all the traffic from the user, including the keystrokes.

• War driver: Only a wireless device such as a laptop or PDA is required to attack some network. The device then roams around the network and locks-on with the unprotected wireless network. Hacker then records all the information ids, the physical address of the network etc. and uploads them on an online database. This directs all intruders to the unsecured address and creates a chaos in the wireless network.

Wireless network provides the ease of being present only in the close proximity to the attackers rather than being physically connected with the network. This enhances the chances of attacks and intrusion in a wireless network, thus compromising privacy of the users. There are various information and software security essentials that should be taken care of. These processes are incorporated in the whole development procedure of any organization providing offshore software development services.

Kevin James is the author of this article. He has been writing articles for Outsourcing Software Development companies like Q3 Technologies. Moreover, he has been providing useful content writing material related to cloud computing strategy.

COMMENTS
Have a question for kevin or want to leave a comment? Click here.

Name: Email:
Comment:
You're a human right?:
Is the night Dark or Bright?

Author:. Kevin James is the author of this article. She has been writing articles for Cloud Computing Company like Q3 Technologies. Moreover, she has been providing useful content writing material related to Mobile App Development. Go Deeper | Website