SlideShare a Scribd company logo
Wireless Networking and
Security
Wireless Networking offers many benefits that are undeniable, but there are some downsides to it. There are many security concerns,
such as Electromagnetic interferences, slower data transfer speeds than wired networks and other drawbacks. This paper will
concentrate on Wireless Networks and the security concerns that should be considered when implementing such technology.
There are two types wireless computer networks.
β€’ 1) An ad hoc network is one that allows wireless communication to
be established from one computer to another.
β€’ 2) Access points are what distinguish Infrastructure Networks. Each
communication within an Infrastructure Network is sent over an
access point.
β€’ Wireless Access Points are equipped with a security feature
called WEP. It uses the encryption algorithm RC4. This is a
symmetric stream encryption cipher.
Use two types of encryption keys. 64 Bit and 128 bit. Two
main purposes of WEP encryption are authentication and
data encryption. Without data encryption, everything sent
from a computer would be encrypted and all received
information would be in plain text. It means that data can be
easily intercepted by unknown third parties and viewed while
it travels over radio waves. WEP is not used to authenticate
who logs onto the wireless computer or network. Anyone
within a reasonable distance can also use the wireless signal
for their own purposes.
Website:
http://www.securebyte.com.es/
External Links
Fortinet EspaΓ±a
cisco EspaΓ±a

More Related Content

PDF
Analysis Of Security In Wireless Network
PDF
Framework for wireless network security using quantum cryptography
PDF
Wireless Security Needs For Enterprises
PPTX
wireless communication security PPT, presentation
PPTX
Wireless LAN Security by Arpit Bhatia
PPT
4g security presentation
PPTX
Internet of things security "Hardware Security"
PDF
A Review Of IP And MAC Address Filtering In Wireless Network Security
Analysis Of Security In Wireless Network
Framework for wireless network security using quantum cryptography
Wireless Security Needs For Enterprises
wireless communication security PPT, presentation
Wireless LAN Security by Arpit Bhatia
4g security presentation
Internet of things security "Hardware Security"
A Review Of IP And MAC Address Filtering In Wireless Network Security

Similar to Wireless networking and security (20)

PPTX
Wireless Communiction Security
PDF
A Review of IP and MAC Address Filtering in Wireless Network Security
PPTX
Wireless Network security
PPTX
Wifi Security
PPT
Shashank wireless lans security
PPTX
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
PPT
Security Issues of 802.11b
PPT
Security Issues of IEEE 802.11b
PPT
Wlan networking and security
PPT
254460979-ishant abcd-098765432222-1.ppt
PPTX
Minimizing Information Transparency
PPTX
Wsn
PPT
4 wifi security
PPTX
Wireless Multimedia
PPT
Wireless Device and Network level security
PPTX
Cyber security
PDF
Ccna 1 7
PDF
Security Technique and Congestion Avoidance in Mesh Network
Β 
PPT
5169 wireless network_security_amine_k
PDF
Wireless security
Wireless Communiction Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Wireless Network security
Wifi Security
Shashank wireless lans security
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
Security Issues of 802.11b
Security Issues of IEEE 802.11b
Wlan networking and security
254460979-ishant abcd-098765432222-1.ppt
Minimizing Information Transparency
Wsn
4 wifi security
Wireless Multimedia
Wireless Device and Network level security
Cyber security
Ccna 1 7
Security Technique and Congestion Avoidance in Mesh Network
Β 
5169 wireless network_security_amine_k
Wireless security
Ad

More from KowsalyaS12 (16)

PPTX
301 vs 302 Redirects
PPTX
Hair Mineral Analysis.pptx
PPTX
Email List Building For Beginners.pptx
PPTX
Why build a targeted email list.pptx
PPTX
Monthly seo services
PPTX
What next E Commerce
PPTX
The secrets to building your email lists
PPTX
Wireless security
PPTX
Wireless securit1
PPTX
Panic attacks
PPTX
Definition of tumescent liposuction
PPTX
Moca
PPTX
Anesthesia awareness during surgery
PPTX
Anesthesia services
PPTX
Build Your Email List
PPTX
Healthcare email lists
301 vs 302 Redirects
Hair Mineral Analysis.pptx
Email List Building For Beginners.pptx
Why build a targeted email list.pptx
Monthly seo services
What next E Commerce
The secrets to building your email lists
Wireless security
Wireless securit1
Panic attacks
Definition of tumescent liposuction
Moca
Anesthesia awareness during surgery
Anesthesia services
Build Your Email List
Healthcare email lists
Ad

Recently uploaded (20)

PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
artificial intelligence overview of it and more
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
newyork.pptxirantrafgshenepalchinachinane
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Module 1 - Cyber Law and Ethics 101.pptx
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
WebRTC in SignalWire - troubleshooting media negotiation
Unit-1 introduction to cyber security discuss about how to secure a system
Introuction about ICD -10 and ICD-11 PPT.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Design_with_Watersergyerge45hrbgre4top (1).ppt
artificial intelligence overview of it and more
PptxGenJS_Demo_Chart_20250317130215833.pptx
Paper PDF World Game (s) Great Redesign.pdf
Job_Card_System_Styled_lorem_ipsum_.pptx

Wireless networking and security

  • 2. Wireless Networking offers many benefits that are undeniable, but there are some downsides to it. There are many security concerns, such as Electromagnetic interferences, slower data transfer speeds than wired networks and other drawbacks. This paper will concentrate on Wireless Networks and the security concerns that should be considered when implementing such technology.
  • 3. There are two types wireless computer networks. β€’ 1) An ad hoc network is one that allows wireless communication to be established from one computer to another. β€’ 2) Access points are what distinguish Infrastructure Networks. Each communication within an Infrastructure Network is sent over an access point.
  • 4. β€’ Wireless Access Points are equipped with a security feature called WEP. It uses the encryption algorithm RC4. This is a symmetric stream encryption cipher. Use two types of encryption keys. 64 Bit and 128 bit. Two main purposes of WEP encryption are authentication and data encryption. Without data encryption, everything sent from a computer would be encrypted and all received information would be in plain text. It means that data can be easily intercepted by unknown third parties and viewed while it travels over radio waves. WEP is not used to authenticate who logs onto the wireless computer or network. Anyone within a reasonable distance can also use the wireless signal for their own purposes.