SlideShare a Scribd company logo
Composition Assistance - Topic Gun Control
Assignment 2: Your Research Paper's Annotated Bibliography
Revisit the topic that you listed in your research proposal
from Module 1, and do some research. If you have some trouble,
you may need to narrow it a bit to find appropriate academic
source material. Your selected topic will be the topic for your
final paper in this class.
For this assignment, you need to complete an annotated
bibliography of the sources you are finding for your research
paper. As you continue to work on your project, add to your list,
so that when you are ready for your final draft you can remove
the unused citations and all annotations. After these things are
removed, and your page is re-titled “References,” it will be
ready to submit as part of the final paper. Here are the things
you should look for in a good annotated bibliography:
· You use at least three university-level resources that are
authoritative, correct, unbiased, current, and coherent.
· Your title is “References,” not “Bibliography.” Your authors
are listed in alphabetical order, and there is a short explanation
after every citation.
· Your citations are APA formatted (with hanging indent) and
each needed block of annotation text is in the appropriate order.
· The work is formatted in 12 point, Times New Roman font,
with one inch margins all around.
· You offer a description of the source’s usefulness: statistics,
clever quote, graph, table, fact, or other relevant information. If
a source is not useful, you note that it is not going to be used in
your paper.
5
Table of Contents
Wireless Network Security 3
Introduction 3
Overview of Wireless Technologies 4
Standards of Wireless Specification: 6
Security Features 6
Wireless Threats 7
Wireless Networks Attacks 8
Conclusion 9
References 10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of
security because of hacking aspect, the wireless technology has
been under threat as the same as the wired network, but on the
other hand they are vulnerable to additional risk( Silva, Santos
& Nogueira,2015). The wireless network usually transmits data
via the radio frequencies that enhance the possibility of tapping
the information by threaten invaders if it is not properly
protected. The threaten invaders have founded a way to get the
access to the wireless system to steal or destroy the original
information, the attackers launch strikes which are related to
network bandwidth and prevent the authorized users to use their
desired services, and they also keep an eye on the conversations
that are taking place. For instance, the hackers or threaten
invaders successfully get into wireless systems to have access to
important information. The project mainly focuses on the
IEEE802.11 and IEEE802.16 which are group of standards for
wireless local area networks (WLANs) and metropolitan area
networks (WMANs) respectively.Overview of Wireless
Technologies
The wireless technologies make the gadgets to have
communication without any connection physically, implying
that they do not need peripheral or network cabling. The
wireless range from the complicated environments, for instance
mobile networks that includes 3G mobile phones and local area
networks, to less complicated gadgets such as microphones
without wire, earphones and other gadgets which will not save
or process data and usually used for small range procedures
like infrared or communications via Bluetooth (BT) (Egners,
Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote
controls and mice all needs a direct line of sight between the
receiver and transmitter to complete the link. Even though the
infrared communication replaced by BT technology in most of
the gadgets, some legacy standard gadgets still use IR for short
range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism
between other wireless communications and the traditional
wired networks. Wireless network can be structured in different
ways but they are frequently categorized into 4 main categories
based on their coverage range.
· Wireless wide area network (WWAN)
Which involves wide are technologies for instance 2G which
includes general packet radio service and 3G cellular that
includes high speeds packet access.
· Wireless metropolitan area network (WMAN)
That represents wireless internet connection at broadband speed
in cities and is usually referred as wireless broadband. It haves
the technologies such as IEEE802.16 and the upcoming
standards such as mobile broadband wireless access.
· Wireless local area network (WLAN)
It involves Wi-Fi (802.111) and Hipper LAN and is a kind of
local area network in which information is carried through radio
waves which has high frequency instead of wires or
cables.Standards of Wireless Specification:
· The IEEE 802.15 standard is usually termed as Bluetooth. This
standard prompt low intricacy and small power connection,
perfect for close devices.
· IEEE 802.15 is a sub-standard that refer the requirements of
low sum wireless individual area nets or ZigBee. The ZigBee
has been developing the robotics of dynamism supervision,
building and home structure administration that comprises
heating, lighting, and refrigeration method and efficacy
observing.
· IEEE802.1x is a certain standard that defines a framework for
authentication and controlling user traffic to secure network,
handling and managing the different devices of the framework.
The 802.1X enhance many authentication methods.Security
Features
Security characteristics of WiMAX and Wi-Fi have been
created with secured measures measure to meet the standards
for secured transaction of wireless data. WiMAX technologies
incorporated the some of the features that are mentioned below
(Tepšić, Veinović & Uljarević, 2014).
Security features of IEEE802.11
The IEEE802.11 WLAN standard has established many
services to provide a secure operating environment. The recent
ones are WEP6, WPA7 andWPA28
· Wi-Fi protected access (WPA) it is a development on WEP is
WAP which was established in 2003. The WPA averts most
WEP’s susceptibilities and increases the ability of confirmation
and encryption (Chenoweth, Minch & Tabor, 2010). The Wi-Fi
security access 2 is an advancement one WPA, this further
increase the power of encryption with a space to utilize the
advanced encryption normal and improve key supervision
controls and authentication. The security features of
IEEE802.16
· It is has undergone tremendous review by information security
researcher to minimize any loophole in the security procedures
and implementation stipulated in the specification. The modern
802.16 security architecture involves the following protection
measures (Illiano, & Lupu, 2015).
· Privacy and key management
That gives a view on how the keys are managed securely in a
WiMAX gadget or at the time of interaction between key and
data. It offers security to keys which is important feature of
WiMAX network and its data which transmits
wirelessly.Wireless Threats
The wireless security risks are usually in three categories
that are identified in TISN wireless security: confidentiality,
integrity and availability. These properties should be understand
perfectly mis understanding those properties will cause
deployment errors choice those results to security (Chenoweth,
Minch & Tabor, 2010).
Improper configuration of wireless will make the
company standards low in security. Wireless devices are usually
designed in standard techniques and reduce security standards.
These threats will make the same attacks happen again includes
keeping an eye on conversation, recording the screen shots etc.
Any network system is suspected to attacks based on how a
system functions. Many of wireless systems use TCP/IP or other
communication methods, and any threat that can be performed
using the procedures will be possible on the wireless systems
(Silva, Santos & Nogueira, 2015). Now a days enhanced
security measures became a primary goal for any organization
tier design.Wireless Networks Attacks
Wireless networks have a great possibility to be attacked by the
attackers in all the possible ways like passively or actively. The
United States institute of standard and technology define 6
different kinds of attacks under categories for Wi-Fi
technology. These attacks are also applicable to wire network
that companies commonly use, whether mobile, fixed, and long
or short range.
· Passive attack: it is an attack in which an unauthorized person
has the access to an asset and does not modify its consent. The
passive attack can be either traffic analysis or eaves dropping.
· Active attack is whereby an authorized person makes changes
to a data, message, and file or data streams. The mechanism
used by active attacks is masquerading where attacker
impersonates an authorized person and thereby gets certain
unauthorized privileges.
· The active attackers also use replay to monitor transmissions
and retransmits messages as the authorized user. Message
modification is another method that active attackers use to alter
message by, adding, deleting and reordering. The active
attackers also employ aspect of denial of service that prevents
the authorized user or management of communication facilities
(Tepšić, Veinović & Uljarević, 2014).
Sample attacks for Wi-Fi networks
· Exploitation of firmware or software vulnerabilities in
wireless devices or networks.
· Denial of services, where there is overwhelming nodes with
much traffic. Disassociating wireless clients to frequently
disconnect from network.
· Cracking authentication procedures: some wireless login
protocols vulnerable to dictionary attacks and precipitation
attacks, this is where the malicious persons passively gets
wireless data exchanges, and then utilize the packets to decode
keys.Conclusion
The security on wireless technology is an issue in the
modern world because of hackers and malicious problems. The
standards are put in place to protect wireless threats. Wireless
network are only secure if all the standards and precaution are
meant and well configurations of wireless networks. Wireless
network are vulnerable to most of threats of wired network
References
· Egners, A., Herrmann, P., & Meyer, U. (2015). Multi-operator
wireless mesh networks secured by all-encompassing
security architecture. International Journal of Information
Security, 14(2), 169-186. doi:10.1007/s10207-014-0244-y
· Silva, H., Santos, A., & Nogueira, M. (2015). Routing
management for performance and security tradeoff in
wireless mesh networks. International Journal Of Information
Security, 14(1), 35-46. doi:10.1007/s10207-014-0246-9
· Sun, X., Yan, B., Zhang, X., & Rong, C. (2015). An Integrated
Intrusion Detection Model of Cluster-Based Wireless Sensor
Network. Plos ONE, 10(10), 1-16.
doi:10.1371/journal.pone.0139513
· Tepšić, D., Veinović, M., & Uljarević, D. (2014).
PERFORMANCE EVALUATION OF WPA2 SECURITY
PROTOCOL IN MODERN WIRELESS NETWORKS.
Singidunum Journal Of Applied Sciences, 600-605.
doi:10.15308/SInteZa-2014-600-605

More Related Content

Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx

  • 1. Composition Assistance - Topic Gun Control Assignment 2: Your Research Paper's Annotated Bibliography Revisit the topic that you listed in your research proposal from Module 1, and do some research. If you have some trouble, you may need to narrow it a bit to find appropriate academic source material. Your selected topic will be the topic for your final paper in this class. For this assignment, you need to complete an annotated bibliography of the sources you are finding for your research paper. As you continue to work on your project, add to your list, so that when you are ready for your final draft you can remove the unused citations and all annotations. After these things are removed, and your page is re-titled “References,” it will be ready to submit as part of the final paper. Here are the things you should look for in a good annotated bibliography: · You use at least three university-level resources that are authoritative, correct, unbiased, current, and coherent. · Your title is “References,” not “Bibliography.” Your authors are listed in alphabetical order, and there is a short explanation after every citation. · Your citations are APA formatted (with hanging indent) and each needed block of annotation text is in the appropriate order. · The work is formatted in 12 point, Times New Roman font, with one inch margins all around. · You offer a description of the source’s usefulness: statistics, clever quote, graph, table, fact, or other relevant information. If a source is not useful, you note that it is not going to be used in your paper. 5
  • 2. Table of Contents Wireless Network Security 3 Introduction 3 Overview of Wireless Technologies 4 Standards of Wireless Specification: 6 Security Features 6 Wireless Threats 7 Wireless Networks Attacks 8 Conclusion 9 References 10
  • 3. Wireless Network SecurityIntroduction The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015). Typical IP network wireless devices or infrastructure Access points or base stations
  • 4. · Station wireless · Router wireless Retransmission devices (Sun, Yan, Zhang & Rong, 2015). · Repeater wireless · Network bridge wireless End points · Cards or adapters wireless · Laptops · PDAs · Mobile telephones Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015). Network classification of wireless networks Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range. · Wireless wide area network (WWAN) Which involves wide are technologies for instance 2G which includes general packet radio service and 3G cellular that includes high speeds packet access. · Wireless metropolitan area network (WMAN) That represents wireless internet connection at broadband speed in cities and is usually referred as wireless broadband. It haves the technologies such as IEEE802.16 and the upcoming standards such as mobile broadband wireless access. · Wireless local area network (WLAN) It involves Wi-Fi (802.111) and Hipper LAN and is a kind of local area network in which information is carried through radio waves which has high frequency instead of wires or
  • 5. cables.Standards of Wireless Specification: · The IEEE 802.15 standard is usually termed as Bluetooth. This standard prompt low intricacy and small power connection, perfect for close devices. · IEEE 802.15 is a sub-standard that refer the requirements of low sum wireless individual area nets or ZigBee. The ZigBee has been developing the robotics of dynamism supervision, building and home structure administration that comprises heating, lighting, and refrigeration method and efficacy observing. · IEEE802.1x is a certain standard that defines a framework for authentication and controlling user traffic to secure network, handling and managing the different devices of the framework. The 802.1X enhance many authentication methods.Security Features Security characteristics of WiMAX and Wi-Fi have been created with secured measures measure to meet the standards for secured transaction of wireless data. WiMAX technologies incorporated the some of the features that are mentioned below (Tepšić, Veinović & Uljarević, 2014). Security features of IEEE802.11 The IEEE802.11 WLAN standard has established many services to provide a secure operating environment. The recent ones are WEP6, WPA7 andWPA28 · Wi-Fi protected access (WPA) it is a development on WEP is WAP which was established in 2003. The WPA averts most WEP’s susceptibilities and increases the ability of confirmation and encryption (Chenoweth, Minch & Tabor, 2010). The Wi-Fi security access 2 is an advancement one WPA, this further increase the power of encryption with a space to utilize the advanced encryption normal and improve key supervision controls and authentication. The security features of IEEE802.16 · It is has undergone tremendous review by information security
  • 6. researcher to minimize any loophole in the security procedures and implementation stipulated in the specification. The modern 802.16 security architecture involves the following protection measures (Illiano, & Lupu, 2015). · Privacy and key management That gives a view on how the keys are managed securely in a WiMAX gadget or at the time of interaction between key and data. It offers security to keys which is important feature of WiMAX network and its data which transmits wirelessly.Wireless Threats The wireless security risks are usually in three categories that are identified in TISN wireless security: confidentiality, integrity and availability. These properties should be understand perfectly mis understanding those properties will cause deployment errors choice those results to security (Chenoweth, Minch & Tabor, 2010). Improper configuration of wireless will make the company standards low in security. Wireless devices are usually designed in standard techniques and reduce security standards. These threats will make the same attacks happen again includes keeping an eye on conversation, recording the screen shots etc. Any network system is suspected to attacks based on how a system functions. Many of wireless systems use TCP/IP or other communication methods, and any threat that can be performed using the procedures will be possible on the wireless systems (Silva, Santos & Nogueira, 2015). Now a days enhanced security measures became a primary goal for any organization tier design.Wireless Networks Attacks Wireless networks have a great possibility to be attacked by the attackers in all the possible ways like passively or actively. The United States institute of standard and technology define 6 different kinds of attacks under categories for Wi-Fi technology. These attacks are also applicable to wire network that companies commonly use, whether mobile, fixed, and long
  • 7. or short range. · Passive attack: it is an attack in which an unauthorized person has the access to an asset and does not modify its consent. The passive attack can be either traffic analysis or eaves dropping. · Active attack is whereby an authorized person makes changes to a data, message, and file or data streams. The mechanism used by active attacks is masquerading where attacker impersonates an authorized person and thereby gets certain unauthorized privileges. · The active attackers also use replay to monitor transmissions and retransmits messages as the authorized user. Message modification is another method that active attackers use to alter message by, adding, deleting and reordering. The active attackers also employ aspect of denial of service that prevents the authorized user or management of communication facilities (Tepšić, Veinović & Uljarević, 2014). Sample attacks for Wi-Fi networks · Exploitation of firmware or software vulnerabilities in wireless devices or networks. · Denial of services, where there is overwhelming nodes with much traffic. Disassociating wireless clients to frequently disconnect from network. · Cracking authentication procedures: some wireless login protocols vulnerable to dictionary attacks and precipitation attacks, this is where the malicious persons passively gets wireless data exchanges, and then utilize the packets to decode keys.Conclusion The security on wireless technology is an issue in the modern world because of hackers and malicious problems. The standards are put in place to protect wireless threats. Wireless network are only secure if all the standards and precaution are meant and well configurations of wireless networks. Wireless network are vulnerable to most of threats of wired network
  • 8. References · Egners, A., Herrmann, P., & Meyer, U. (2015). Multi-operator wireless mesh networks secured by all-encompassing security architecture. International Journal of Information Security, 14(2), 169-186. doi:10.1007/s10207-014-0244-y · Silva, H., Santos, A., & Nogueira, M. (2015). Routing management for performance and security tradeoff in wireless mesh networks. International Journal Of Information Security, 14(1), 35-46. doi:10.1007/s10207-014-0246-9 · Sun, X., Yan, B., Zhang, X., & Rong, C. (2015). An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network. Plos ONE, 10(10), 1-16. doi:10.1371/journal.pone.0139513 · Tepšić, D., Veinović, M., & Uljarević, D. (2014). PERFORMANCE EVALUATION OF WPA2 SECURITY PROTOCOL IN MODERN WIRELESS NETWORKS. Singidunum Journal Of Applied Sciences, 600-605. doi:10.15308/SInteZa-2014-600-605