• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Is wi-fi safe? Wi-Fi is widely used in mobile phones, gaming devices, house networks and other electronic devices that need wireless networking.

Extracts from this document...

Introduction

A: -PRESENTATION THE ISSUE Wi-Fi is the short form for wireless fidelity. Wi-Fi is a technology used for networking. People all over the world use this technology. Wi-Fi is now found in devices like laptops, phones, PDA's, game consoles etc. the Wi-Fi networks are mostly set up in offices, schools, restaurants, home. This technology connects the device to the Internet using wireless router, which is connected to the net by the modem. It is very useful and the numbers of users are increasing day by day. Every technology has its advantages and disadvantages. One of the major disadvantages of this technology is that others can abuse it. There are many complains which were faced in the past, i.e. the terrorist abused the technology by sending threat emails from unsecured Wi-Fi networks using the owners IP address. As soon as there were cases like the Ahmadabad bomb blasts where a Wi-Fi system was used in order to send a terror email, usage of Kamran Power Control to send their sinister mail about the bomb blast in Delhi to the media and a unsecured network in Chembur, Mumbai was used to send a threat email and the owner who was innocent was caught. ...read more.

Middle

C: Area of impact Wi-Fi adapter lets the device connect to the Internet using the local area network. The free access points in hotels and schools can be used by the thieves or the nasty people to attack certain area or hack some personal information and it becomes very difficult to track the thief because the free access points are used by a lot of people at the same time. Due to this a hacker can gain all the information of the owner as well as misuse it or destroy it in some or the other way. This is generally done to send threat emails and emails informing about bomb blasts. A lot of times hackers can get the SSID of the Wi-Fi user and they can cause harm to the users with help of the SSID. Wi-Fi uses unlicensed 2.4Ghz spectrum and if there are devices like oven, Bluetooth cordless phones it might adversely affect the efficiency of Wi-Fi and may also have effects on the performance. ...read more.

Conclusion

This prevents from the people to decrypt your password or try and connect to it. 3-SSID broadcasting. The router transmits the SSID, which is the name given to the router. If everyone can find the name of the router then its easy for them to hack inside it, so the broadcasting of SSID should not be broadcasted. 4-encryption This is one of the best ways of protecting your network. The two standard encryptions are wireless protocol (WEP) and Wi-Fi protected access (WPA) 5-SSID names. One should change the SSID with a different name every time the password of the router is changed. This will improve the security of your wireless network. After the threat emails sent from Mumbai, cyber crime branch has been trying see to it that the security level is high and there is no loophole left behind. They are trying to make the network secured and with high security possible so that no one can make misuse this technology in future. Mean while preventive measures should be taken to keep the network as secured as possible. 1) Wikipedia. Org, Wi-Fi, http:// www.en.wikipedia.org/Wiki/WiFi (2008-10-10) ?? ?? ?? ?? Ishaan Khanna ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. Analyze the film Blade Runner, discuss the narrative techniques, representations, use of stereotypes and ...

    The police officers (blade runners) also fall into this equation. A good example of this is when Deckard is brought to Harry Bryant's (M. Emmet Walsh) office. It's not just the characters here that fit the stereotype theme, the setting fits also. The scene starts with Deckard being brought into the captains office, dark and

  2. Development of Nora's and Torvalds relationship in "Dolls House"

    With Nora from the outset pretending to be the submissive darling wife to her husband has but left the audience understanding her true nature. She's anything but a 'prefect' wife and could pass of as a wife-in-training or a juvenile as she's also seem in her husband's eyes, but to him decorated in his eyes of lust.

  1. Burqa ban. Banning the Islamic face veils or not, that has been an intense ...

    1 "Mapping the Global Muslim Population." The Pew Forum on Religion & Public life. Web.

  2. Extended Essay: How do different Flavours, Storage Times affect the Effectiveness of Crisps as ...

    2 12 9 8 9.7 1.03 1.09 0.84 0.99 4055 4096 0.07 4 17 8 16 13.7 1.55 1.33 1.77 1.55 5727 3695 0.08 6 10 14 14 12.7 1.78 1.61 1.72 1.70 5309 3123 0.10 8 10 17 11 12.7 1.61 1.73 1.41 1.58 5309 3360 0.09 10

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    In the present, HIPAA is still trying to perfect The Privacy Rule so using HIT would be safer. Resources: 1. Bihari, Michael. "Using Health Information Technology to Manage Your Information." About. 6 April 2010. 25 Sept 2010. <http://healthinsurance.about.com/od/healthinsurancebasics/a/health_IT_overview.htm> 2. Spring, Manda. "EMR Advantages and Disadvantages." Bright Hub. 16 Dec 2008.

  2. Free essay

    The Evolution of a Theme/Element in Popular Culture. Industries such as the jewellery and ...

    Cartoons were never just for children. The 1990's saw the beginnings of a new wave of animated series targeted primarily to adults. In 1989, the 'Simpsons' portrayed the life of a typical middle class American family in those days. It also dealt with many political issues in the adult world, but, through an amusing, humorous way.

  1. What are the concerns of practitioners and patients on Electronic Medical Records?

    Besides that, the security also means the loss of data due to technical problems or losing hard drives. B. The IT Background of the issue The rapid developments of technology like fast processors, large hard drives, and even the widespread of the internet have allowed the installment of the EMR systems more feasible.

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    The topic is highly debated, because some question the authenticity of it. Some pro-life activists say regardless of the circumstances, life should be preserved at all costs, and euthanasia is essentially murder. However, others counteract this argument saying that it is the most humane condition for a person to leave this world for those whom seek the injection.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work