Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Wireless Internet Security

Introduction to Wireless Internet Security

➢ Wireless internet security is the prevention of unauthorized access or


damage to computers or data using wireless networks, which include
Wi-Fi networks. WPA2 uses an encryption device that encrypts the
network with a 256-bit key; the longer key length improves security
over WEP.

➢ The risks to users of wireless technology have increased as the service


has become more popular. There were relatively few dangers when to
wireless technology was the first introduced. Hackers had not yet had
time latch on to the new technology, and wireless networks were not
commonly found in the work place. However, there are many security
risks associated with the current wireless protocols and encryption
methods, and in the carelessness and ignorance that exists at the user
and corporate IT level.

➢ Many laptop computers have wireless cards pre-installed. The ability to


enter a network while mobile has great benefits. However, wireless
networking is prone to some security issues. Hackers have found
wireless networks relatively easy to break into, and even use wireless
technology to hack into wired networks.
Applications of Wireless Internet Security

Wireless networks support many applications that benefit from user mobility and higher
reliability because of less error-prone Applications of wireless networks also fall within
private or public scenarios. private applications are made only available for company
employees or home occupants. Access to the applications is not made available to the
general public. Public applications, on the other hand, provide open access to anyone.
➢ Voice over Wireless
The use of wireless networks to support the transmission of voice conversations is
beneficial solution when people need to constantly stay in contact with each other.
In fact, a wireless LAN designed to support voice communications can completely
replace a traditional wire-based telephone system within a particular facility. The
combination of voice and data over the same wireless network provides total
mobility and lower operating costs.
For example, employees within a retail store can locate certain clothes for a
customer or check inventory by using special wireless LAN phones for different
purposes.

➢ Inventory Control
Many businesses profit from using wireless LANs when managing their
manufacturing processes. This lowers operating costs. Because the connections
between the manufacturing equipment and main control systems are wireless, the
company can reconfigure the assembly process at anytime from anywhere, saving
time and money.
➢ Health Care
In most cases, hospitals deploy wireless LANs in high patient-traffic areas including
emergency rooms, critical care wards, nursing stations, as well as in doctor's offices
and patient waiting areas. Hospital staff can use mobile computer devices to
increase efficiency and accuracy when caring for patients.

2
➢ Education
Many colleges and elementary schools are finding beneficial reasons to install
wireless LANs, mostly to provide mobile network applications to their students. In
fact, schools have begun using the existence of wireless LAN access as a
competitive advantage. These schools are targeting the growing number of students
with laptops and expectations of accessing the Internet and school resources from
anywhere on campus, such as classrooms, libraries, quads, and dormitories.
Students are able to readily check e-mail, surf the Web, access specialized school
applications, check grades, and view transcripts. As a result, students make better
use of their time.

➢ Location-Based Services
With wireless networks, you can make the location of a particular person or item
available to a central location. The ability to track the position of moving objects
brings about some interesting applications. The coordinates of users can feed into a
server-based application that implements a location-based service. Examples:
Swiggy,zomato etc these food delivery agency uses this to track order for
customers.

Conclusion
Advances in networking storage have allowed for organizations to use their networks not
only for the sharing of resources but to store large pools of data to be used for data
analysis In the future, the speed of networks will increase as they have in past years. The
cost of networks will continue to decline and using a network will be essential for every
organization. As computing technology increases in power, and decreases in size, the price
of creating a high-powered full featured network will decrease rapidly.

Submitted by
R.Abhishek
180030722
Section - 16

3
4

You might also like