Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

SECURING WIRELESS NETWORK

JINAL DHOBI

SECURING WIRELESS NETWORK


INTRODUCTION In todays world of speed, mobility and reliability numerous organizations have deployed wireless networks for better efficiency of the work contrary to wired network.
Wireless security is the quality of data processing concerning

the prevention of unauthorized access or damage to function of and data with computers via wireless networks.
Wireless network has become very popular in the home and

office networks.

Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks.
Wireless networks are many and diverse but are frequently

categorized into three groups based on their coverage range: Wireless Wide Area Networks (WWAN), WLANs, and Wireless Personal Area Networks (WPAN).WWAN includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hiper LAN, and several others.

WIRELESS ROUTER

NEED OF SECURITY
The advantages of wireless are tremendous, the security issues

are real. Now we need to implement security measures for protecting sensitive data within the wireless network area, reducing unnecessary bandwidth consumption and proving the liability and account ability of the network.
Wireless users need to protect their networks with the tools that

can provide the same level of security as wired networks.

Security Challenges and Risks in Wireless Networks


Loss of Confidentiality Loss of Authentication Loss of access Control Loss of network Availability Loss of Integrity Control

COCLUSIONS
As

wireless networks are becoming integral part of organizations, industries, enterprises, homes and other businesses, security becomes the major concern for wireless network deployment. Hence Countermeasures to provide the security are utmost important. By implementing and using software and hardware countermeasures, organizations can mitigate maximum amount of risks and should be shield from unauthenticated attacks.

THANK YOU

You might also like