Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Virtually every threat that exists on wired networks also exists on wireless and mobile networks

Virtually every threat that exists on wired networks also exists on wireless and mobile networks

Computer Science

Virtually every threat that exists on wired networks also exists on wireless and mobile networks. In addition to these threats, some threats are specific to wireless and mobile networks.

In a wireless or mobile environment, attackers can deny service by creating radio interference that prevents clients from communicating with access points. Another method is to physically take out a mobile backhaul connection to deny network access to smartphone subscribers. Managing mobile and Wi-Fi–enabled devices requires a broader approach than managing the security of wired networks.

For this assignment:

  1. Research data theft threats, device control threats, and system access threats to both wireless and mobile networks.Be
  2. Briefly describe each threat for each of the two environments (that is, mobile and wired networks) using two examples.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Wireless And Mobile Network

Part One

Data theft is stealing digital information stored in computers and servers with unrecognized victims to attain confidential information. Data theft can occur in both wireless and mobile networks. In wireless networks, data security risks include; piggybacking wardriving, wireless sniffing and even evil twin attack (Lin, 2016). Piggybacking occurs in wireless networks when wireless-enabled computers access and connects with the network, a condition that can lead to illegal activities. Evil twin attacks entail gathering information about a network access point and then laying down the strategies to impassionate it. Mobile security threats are often thought to be a single and whole encompassing threat. Data leakage, unsecured Wi-Fi, and even phishing attacks are some examples of mobile threads. In wireless devices, denial of service, passive capturing and even freeloading can be applied to prevent threads.

Part Two 

            Wired networks have a thread of junction connection. The wired network has the challenge of being interconnected to other devices by unauthorized individuals. For example, experts can create a junction in unknown places to connect their computer devices to the organization servers (Mavoungou et al., 2016). Through this, the organization will lose essential information.

            Data leaking as a mobile threat entails and happens different hostile mobile apps that are enterprise signalled. A good example is ''riskware'' which often challenges mobile users because they give them broad permission but don't emphasize on security. They are known apps found in the app store, which performs as advised and sends the users personal information. Additionally, the use of unsecured Wi-Fi, for example, uses an unsecured Wi-Fi network. Since mobile phones are known to be on for a long period of time, phishing attacks are often attempted.