Case Study: Latest Wireless Attacks What are some of the most recent attacks tha
ID: 3919186 • Letter: C
Question
Case Study: Latest Wireless Attacks
What are some of the most recent attacks that have been launched against wireless systems? What vulnerabilities did they exploit? How much damage was caused? What was the estimated dollar amount of the loss? How could they have been better protected?
Case Study: Wireless Security Web Sites
It is important to keep abreast of the latest wireless security vulnerabilities and attacks so that your wireless network can be made secure. Using Internet search engines, research Web sites that contain information about wireless security. Find the top three sites that you would recommend. Which sites have the most up-to-date information? Who sponsors these sites? What are other types of valuable information on the sites?
Case Study: WEP Attack Tools
How available are WEP attack tools? Use the Internet to search for WEP attack tools. Compile a list of the top three tools and list their features. What are the system requirements? How quickly can they crack WEP? What are their advantages and disadvantages?
Explanation / Answer
Please Note: Your Post contains more than one Question. As per Chegg Guidelines, I have answered the first question. Please Re-Post for other Questions.
Case Study: Latest Wireless Attacks
What are some of the most recent attacks that have been launched against wireless systems? What vulnerabilities did they exploit? How much damage was caused? What was the estimated dollar amount of the loss? How could they have been better protected?
Answer)
Information security is very important in today's world where the computers and networks handle all data. This malicious activates such as hacking and data leakages are prevalent and are abundant in activates by the attackers who perform attacks and try to access unauthorized or secure content from computers or networks. There are different types of attacks which have been launched against wireless systems such as:
Packet Sniffing - In many cases packets are not encrypted and thus this lets the attacker to use packet sniffing tools and get confidential data from the network.
Rogue Access Point - This is an unauthorized access point (AP) which can be used to attack the network and leave it prone to many vulnerabilities which can be attacked.
Password Theft - If the website you are logging onto doesn't use encryption to secure the passwords, user ids and other information, data and information can be leaked and the passwords can be stolen.
Man in the Middle Attack - Here an attacker can pose to be a trusted party in the middle of communication between 2 parties and thus poses a problem for the security.
WEP/WPA Attacks - WEP/WPA are old encryption standards which should not be used nowadays and thus are vulnerable.
Information and data can be leaked as a part of attacking the networks in the above vulnerabilities in the network and when an attacker attacks the network using any vulnerability. The estimated dollar value can be anything from hundreds of dollars to millions of dollars depending upon whether individual or business and the amount of data and the sensitivity of the data which was leaked.
The could have been better protected by closing the gaps, vulnerabilities, using encryption protocols, replacing old protocols with latest ones, having security software and firewalls installed and monitoring the network activities and services on the network.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.