Security Measures in Wired and Wireless Networks
The purpose of analysing this journal article is to learn more about the security plans that we must take on board in order to protect our wireless network. Because of the nature of wireless fidelity (Wi-Fi) technology which by rule the data is not travelling via a wired network our networks are exposed to the public space and our job is to secure them. This article introduces many security measures and make very clear the way to use the encryption technology that our wireless devices come with to protect our data.
The existing protocols are the wired equivalent privacy protocol (WEP) and the wireless fidelity (WiFi) Protected Access Protocols (WPA or WPA2). By describing those two security protocols the article explain the reasons that even though it is a secure method to protect your files by ordinary people who try to grand access to your network, it is not the most efficient way to protect your WLAN by hackers. The WPA and WPA2 protocol is the most secure method at the moment. it offers a longer key which takes longer to decipher but still even this type of encryption is not 100% secure. By doing experiments for the security of wireless systems and simulations in different protocols the article with the help of tables and figures shows some of the reasons that the “threat” is always one step ahead of the defence mechanisms.
Personal impressions:
This article made me to be aware of the security that we have available for our wireless networks. Also it helped me to form my personal opinion according to issues have been addressed from this article and. By taking on board everything that have been said so far I think that a big security hole is the lack of stronger encryption and the updated wireless devices in a network.That makes it the main problem of personal and business networks and because of that they are vulnerable from unauthorised users. It is a fact that human computer interface designers plays a big role on that specific issue as they raise barriers in the security mechanisms. As a result the daily end user has a limited variety of options which comes mostly from the security programs that computer interface designers has to offer in form of a software of hardware product solution in exchange of customer’s expenses.
Source: COMPTIA SECURITY+ (book)