Wednesday, December 11, 2019

Network Security and Prevention Methods †Free Samples for Students

Question: Discuss about the Wireless Network Security and Prevention Methods. Answer: Introduction: The wireless network is prevented by the un-authentication and unauthorised access of data through the process of wireless security. With the increase of services provided by the wireless network, the risks associated with it is also increasing. A wireless access point is the most security concern because it can serve as the access point for the hackers who can access the confidential information of the user for enabling illegal activities (Saleh, 2013). Wired equivalent privacy and Wi-Fi protected access are the most commonly used wireless security. The policies which are used for securing the wireless network are wireless intrusion prevention system and wireless intrusion detection system. Challenges: The unauthorised access of wireless network can takes place through links, function, data, program code, and others. The prevention methods can be applied to the known mode of attacks. Every operation performed on the wireless network opens the door for the attacker to attack on the network which creates the scene of threatening. The following are some challenges in the wireless security which can cause disruption in the operational working of the organization: Challenges Short Falling of the organization Access control Vulnerability is the major challenge with the wireless network Authentication Insufficient practices for securing the wireless network. Authorization Lack of procedures of authentication Security of data Privacy of the data is not kept Detection of intrusion Compromising and misplacing of data Prevention from the intrusion Access of the network is given to the user without any necessary security control Monitoring system Monitoring of wireless network is a complex task. Problems: Some of the common modes of attack are listed below in the table: Types of attacks Description Accidental association The security perimeter can be violated by the accidental association. The overlapping of the network through wireless access point without the knowledge the user can create the entrance of security breaches. It can result into loss of confidential information and exploitation of the computer system. Wireless vulnerability is the cause of accidental association. It can be caused due to the association of the use on different APIs Malicious association Malicious association occurs when the wireless devices make use of the software created by the hackers. The hackers can get the access of the system through the access points. The security measures of virtual private network does not put barrier on the malicious attack. AdHoc network The security threat can be caused to AdHoc network. The Adhoc network is the point to point wireless connection of the network which does not possess access point. The Adhoc network act as a bridge for the corresponding network in the business world. The operation performed in the unsecured adhoc network can create the entrance for the security breaches. The exposure of private data can occur on the indirect bridges. The indirect bridge is created between the user system and the LAN connection. Non-traditional network The use of Bluetooth devices and personal network Can be the source of security breaches. MAC Spoofing The problem of MAC spoofing occurs when the hacker is able to crack the MAC address of the computer. Mac filtering is used for authorised the system with the Mac ID for gaining access and utilizing the network. The security through Mac filtering is efficient in the small network. It fails in the environment of organization network. Man in the middle attack Man in the middle attack occurs when hacker entered into the network through the medium of the access point. Hotspot is the area of security threats. The de-authentication attack can be executed by using handshake protocols. Denial of service attack When the large request of connection is sent to the access point, the situation of denial of service attack occurs. It can interrupt te flow of data on the network. Extensible authentication protocol is the failure in the denial of service attack. The organization data can be disclosed to the hackers. Prevention methods: There are three principles used for securing the wireless network which are described below: In the environment of closed network, the access points are configured for putting restriction on the access of data (Wuest, 2010). The restrictions are in the form of encryption methods such as Mac Address. The wireless LAN security can be implemented by using the network model of wireless intrusion prevention system. In the large organization, the isolation of the wireless network is used for preventing open and unencrypted data (Mylonas, 2016). The security measures should be checked and update periodically for the betterment of wireless security program. The user cannot access the internet through any local devices. All the web traffic is forwarded to the captive portal, when the use asked to access data then he has to pay for taking authorisation. The virtual private network can be used for securing the network of the enterprise. It has been analysed, in wireless network more security is required than wired network. In the wireless network, the hacker can get the access of the network through backdoors (Sari, 2015). For securing the access through backdoors, the peer to peer encryption method is required. Some of the security measures are described in the table below: Security Measures Descriptions SSID hiding It is the simple method of securing the wireless network by hiding the service set identifier. The efforts for casual intrusion can be protected. Mac ID filtering Pre-approved Mac address is allowing access to the network. Mac ID filtering is used is used for securing the wireless access points (Laeeq, 2011). The sniffing process can be used by the authorised user for securing the Mac address from spoofing. Static IP addressing The IP addresses are provided to the client through the medium of DHCP in the environment of wireless access points (Preston, 2014). The client can make their own IP addresses which is difficult for the hacker to predict it. 802.11 security The authentication mechanism approved by IEEE standard is used to secure Wireless LAN network. Wired Equivalent privacy The wired equivalent security mechanism can be used for wireless network ratification. It is used for securing modern equipment. WEP protocol is used for upgrading the equipment residing on the organization network. TKIP protocol is used for improving the wired equivalent privacy. Wi-Fi protected access It is the security protocol which is used for addressing the problems occurred in wired equivalent privacy methods. It is the combination of 802.11 IEEE standard and FIPS 140-2 compliance. The keys and the encryption schemes restrict the user to access the network. Wi-Fi protected access is the improved security measure over wired equivalent privacy. RADIUS based authentication is used for securing the enterprise through Wi-Fi protected access. The sequence of key should be created for inclusion of encrypting the message (Gowsalya, 2012). The pre-shared shared key is used for establishing authentication mechanism (Bhatnagar, 2015). It make used of 8 to 63 character password. The hexadecimal string is used for developing shared key. TKIP (Temporary key integrity prototcol) 802.11i is the IEEE standard for temporary key integrity protocol. The message integrity check can be performed by re-keying system. This protocol helps in overcoming the problem of WEP. Applications: The wireless network is successfully used in satellite connections, broadcast radio, infrared communication, Wi-Fi, Microwave communication, mobile communication system, Bluetooth technology, and many others. The wireless network is the accumulation of television remote control, security system, cell phones, Wi-Fi, wireless power transfer, computer interface devices, and others. Some of the common applications of wireless network are smart phones which makes use of android system which depends on induction motor control, Automation in home based on Arduino, load management system controlled by phone, cell phone used in robotic vehicle movement, LED make use of dialled telephone number, load control system by making use of DTMF, message communication between two wireless computer, sequential load operation based on android, electronically controlled notice board for remotely controlling the android, android application based on remote operated domestic appliances, generation of remote password for controlling the operation securely in the application based on android operating system, remote control home automation system, and many more. Impact of issues on real life: Wireless network change the scenario of the medical world. The wireless network helps in bringing social change all over the world. The capabilities of the wireless communication help in protecting the environment (Bidgoli, 2015). The mobile phones and other devices can be used for measuring the temperature of the location, endangered species around the area, increases the productivity of the organization, connects people from all over the world, and others (Ahmad, 2012). Reflection and summary: From the analysis of wireless security, I concluded that the basic step which should be followed are conduction of risk assessment plan, designing of the security program, indulging of monitoring process, countermeasures for vulnerabilities, and maintenance for overcoming the problem of security attack and associated vulnerabilities. Conclusion: The advancement of wireless technology creates the picture of challenge for wireless security. Every operation performed on the wireless network opens the door for the attacker to attack on the network which creates the scene of threatening. The security measures should be checked and update periodically for the betterment of wireless security program. References: Ahmad, A. (2012).Types of security threats and its prevention (1st ed.). Retrieved from https://ijcta.com/documents/volumes/vol3issue2/ijcta2012030240.pdf Bidgoli, H. (2015).Handbook of information security, threatsm vulnerabilities, and prevention (1st ed.). Retrieved from https://books.google.co.in/books?id=0RfANAwOUdICpg=PA93lpg=PA93dq=Research+paper+pdf+on+wireless+network+security+and+prevention+methodssource=blots=pGTo6qv3rjsig=QrlN3OCi_wtlxlRzERbffBnN9EIhl=ensa=Xved=0ahUKEwjp0YfKvYbUAhXDRY8KHYHxC3s4ChDoAQgzMAM#v=onepageq=Research%20paper%20pdf%20on%20wireless%20network%20security%20and%20prevention%20methodsf=false Bhatnagar, R. (2015).Wi-Fi security: A literature review of security in wireless network (1st ed.). Retrieved from https://www.google.co.in/url?sa=trct=jq=research%20paper%20pdf%20on%20wireless%20network%20secuirty%20and%20prevvention%20methods%20source=webcd=9cad=rjauact=8ved=0ahUKEwiU7-WcvYbUAhXMs48KHedICEIQFghqMAgurl=https://www.impactjournals.us/download.php%3Ffname%3D2-77-1431690921-4.%2520Eng-%2520Wi-Fi%2520Security%2520A%2520Literature%2520Review%2520of%2520Security%2520in%2520Wireless%2520Network-Ruchir%2520Bhatnagar.pdfusg=AFQjCNGkDZDzLTuf05jYc3-ncdoRivuIKg Gowsalya, M. (2012).Detection and prevention of congestion attacks on wireless network (1st ed.). Retrieved from https://ijettjournal.org/volume-3/issue-3/IJETT-V3I3P210.pdf Laeeq, K. (2011).Security challenges and prevention in wireless communications (1st ed.). Retrieved from https://www.ijser.org/researchpaper/Security_Challenges_Preventions_in_Wireless_Communications.pdf Mylonas, P. (2016).Real life paradigm of wireless network security attacks (1st ed.). Retrieved from https://www.image.ece.ntua.gr/papers/703.pdf Preston, D. (2014).Security measures in wired and wireless networks (1st ed.). Retrieved from https://www.bcs.org/upload/pdf/ewic_iict09_s4paper2.pdf Saleh, Z. (2013).Wireless networking security in Jordan (1st ed.). Retrieved from https://airccse.org/journal/nsa/5413nsa03.pdf Sari, A. (2015).Comparative analysis of wireless security protocol (1st ed.). Retrieved from https://file.scirp.org/pdf/IJCNS_2015121715205514.pdf Wuest, C. (2010).Wireless networking security (1st ed.). Retrieved from https://www.infosec.gov.hk/english/technical/files/wireless.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.