Security of Wireless Networks

Irida Gjermeni, Jehona Hoxha

Abstract


Wireless networks today have become a normal standard, a technology that could not even be imagined a few years ago. We have them everywhere: at home, in schools, in offices, in restaurants, in airports, in squares or main streets. These wireless networks have become an inevitable, as well as a necessary part to carry out our daily tasks, from the simplest to the most sophisticated ones. Thanks to them, we can study, work, buy, order or book in a very short time and feeling comfortable; all sitting on a chair with a cell phone or laptop in front connected wirelessly.However, the world is somewhat more complex. Things are not as simple as they seem. There are many malicious individuals who have devised hundreds of ways to make these networks vulnerable. A minimum of 800,000 individuals are hacked each year according to Norton, the American antivirus company, but not only. Thousands of businesses, organizations or institutions have also fallen prey to these attacks.In this study, some of the types of attacks that are encountered more often against wireless networks are dealt with. Some key but simple security measures that can be taken by anyone to gain minimal security have been identified, as well as some practical tips for homes, organizations and public spaces have been summarized.The purpose of this study is to clearly show the danger that wireless networks can have, the possible threats and the security measures that can be taken to prevent them.

Keywords: network, wireless, security, attack, hacker, privacy

DOI: 10.7176/CTI/11-02

Publication date:October 31st 2022


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: CTI@iiste.org

ISSN (Paper)2224-5774 ISSN (Online)2225-0492

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org