Wireless Networks Investigation Challenges Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

Wireless technologies are widely used for transmitting information today. The most commonly used tool of wireless technologies is wireless networks that are used by billions of people worldwide. Wireless networks are a good way to transmit or accept data swiftly, but at the same time, all the tools connected to them are highly susceptible to hacker attacks and other threats (Alsharif et al., 2020). Hence, the safety of wireless networks is a matter of extreme concern for IT engineers and programmers.

Main body

Wireless networks are less reliable than wired networks in terms of the safety of users’ confidential data. It is connected to the fact that hackers need access to the wires in order to attack the wired network, and it is quite difficult to do that. Since wireless networks work without wires and are often not protected with a password, it is easier to hack them. There exist several types of attacks on wireless networks, but the most widespread one is called man-in-the-middle (Alsharif et al., 2020). It is usually applied to networks that do not require any password. This type of attack enables the hackers not only to get access to the user’s phone, computer or tablet and get confidential information from it but also to trace and locate all the sites he visits. In rare cases, hackers may even manipulate the tool without the user even knowing it. Another attack is called DDoS-attacks when hackers violate the algorithms of the network, so it stops working, as well as the tools that were connected to it.

Conclusion

To conclude, it is necessary to state that the majority of the challenges related to wireless networks concern the high probability of them being attacked by hackers. Hence, it is necessary for those who use it to create secure logins and passwords, avoid unprotected networks in public places and use Bluetooth carefully. These steps are quite easy to follow, but they will significantly decrease the probability of an attack for those who stick to them.

Reference

Alsharif, M. H., Hilary, A., Albreem, M. A. M., Chaudhry, S. A., Zia, M. S. & Kim, S. (2020). Six generation (6G) wireless networks: Vision, research activities, challenges and potential solutions. Symmetry, 12(4), 676.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, December 21). Wireless Networks Investigation Challenges. https://ivypanda.com/essays/wireless-networks-investigation-challenges/

Work Cited

"Wireless Networks Investigation Challenges." IvyPanda, 21 Dec. 2022, ivypanda.com/essays/wireless-networks-investigation-challenges/.

References

IvyPanda. (2022) 'Wireless Networks Investigation Challenges'. 21 December.

References

IvyPanda. 2022. "Wireless Networks Investigation Challenges." December 21, 2022. https://ivypanda.com/essays/wireless-networks-investigation-challenges/.

1. IvyPanda. "Wireless Networks Investigation Challenges." December 21, 2022. https://ivypanda.com/essays/wireless-networks-investigation-challenges/.


Bibliography


IvyPanda. "Wireless Networks Investigation Challenges." December 21, 2022. https://ivypanda.com/essays/wireless-networks-investigation-challenges/.

Powered by CiteTotal, best essay referencing maker
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1