• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

Extracts from this document...

Introduction

Criterion N: Discussion and Analysis of the Interview Wi-Fi technology is being used in most of the new devices. Devices such as, smart phones, video game consoles, laptops, iPods, etc use it. Many people in day to day life are using this technology. This technology is being used in hotels, airports, restaurants, offices, homes, schools etc. Wi-Fi is a technology, which is replacing local area networks where wire is used for the connection to the Internet. There are drawbacks of this technology, which include, others can connect to your network and get all the personal information of the user. The network many a times is left unsecured due to which anyone can access the Wi-Fi unable device. Mr. Paraskar has been working in the crime branch for the last five years. He has received many complains regarding this technology and is working in order to improve the same. According to Mr. Paraskar hacking into Wi-Fi network is a serious issue and it can create too many problems. Innocent citizens would be blamed if their I.P. ...read more.

Middle

Masquerading of websites and hacking IP addresses leads those making use of Wi-Fi into problems and that they themselves are not aware about and are always innocent. There were several cases of damage caused by hacking, which led to leakage of secretive data, and high security measures need to be taken for using higher standards of id encryption, passwords and the SSID name. Criterion P: Projection of Broader Implications Based on the Interview Wi-Fi lets you use the Internet from any place where the box is set up. This technology is replacing the local area networks ad they do not need cable connections. Wi-Fi can be used only in places where LAN can be set up. The issue of this security is that there are high chances of hackers hacking into Wi-Fi networks and misusing it and the innocent people, will be accused for it. These hackers generally use the owners IP address to send threat emails or any kind of criminal activity. This system is gaining popularity and is made use of in day-to-day life. ...read more.

Conclusion

3- What are the drawbacks of it? A- Hackers can connect to Wi-Fi networks and use the owners IP and misuse it for crime. They can even get all the information stored in your system. 4- How can this technology be improved? A- If the range of the Wi-Fi technology is increased and the Wi-Fi network is more secured 5- What are the security measures that need to taken care of? A- One needs to always keep their Wi-Fi network secured so that no one can misuse it, keep changing passwords at regular intervals. 6- How secured is Wi-Fi? A- Wi-Fi is secured if all the measures are taken care of. The network should not be left unsecured, and the passwords should not be given to any one. 7- What are the steps that are taken to prevent cyber crime? A- We keep a track of the Wi-Fi networks all around and make sure all the networks are secured and cannot be misused. 8- What are the punishments if one is found guilty of their cyber crime? A- There is an information technology act of India, this act considers the crime and order is directly proportional to the crime. ?? ?? ?? ?? Name-Ishaan Khanna ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. SALES OF GOOD ACT

    * The buyer has not yet obtained delivery of the goods. * The buyer has not been declared insolvent. 4) Right to resale - If the price of the goods are not paid the seller may resale the goods to any other buyer.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Another simple thing for consumers to do is to make small orders before making large ones just o make sure the vendor is reliable. For the best form of security, remember to make up a secure password, print and save records when making online transactions and make sure there is a secure checkout and payment process.

  1. ITGS portfolio Extension

    that Wi-Fi networks are not secured by most users and this simplifies the hacking process for hackers. And this is a main loophole in Wi-Fi hacking. Compromise in securing Wi-Fi networks has caused a great amount of damage and led to leakage of secretive data , masquerading of websites and hacking of IP addresses leading to accusations on innocent citizens.

  2. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    Those within earshot will be regaled with a pious tirade on declining intellectual standards, the implication being that our fearless one-person crusader will single-handedly rescue Western thought from imminent collapse. If you're skeptical of such pronouncements, you should be. It doesn't matter whether we think students should or shouldn't use Web sources such as Wikipedia; they will.

  1. Proyecto Personal - Anorexia y Bulimia

    Desafortunadamente, no tuve la oportunidad de asistir a ninguna de las terapias, pero conversamos y me explic� en que consist�an, cu�l era su objetivo, entre otras cosas. Algo que pude observar fue que, luego de hablar con la psic�loga, con los nutricionistas, entrenadores y doctores, obtuve perspectivas un tanto diferentes de cada uno, especialmente de los entrenadores.

  2. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    Under the laws of Li and Jen one aims to become a Ch�n-Tzu, being in social relations on an ethical base driven by virtues alone that would thus, if all would be brought together, create peace. Now as aforementioned, they are they are the virtues that hold dominion over the

  1. Arrival of Bee Box

    Similarly in Stanza 5, she mentions that her "box is only temporary". Thus implying that the poets views on suicide is most likely to be temporary hence instilling hope in the readers mind. Metaphors are one of the integral and main devices that Sylvia Plath uses right through the poem, "The Arrival of Bee Box".

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    Internet Explorer) and printing speed. Windows XP Macintosh OS X Tiger System name Dell OptiPlex 755 Apple iMac 4.2 OS version XP Service Pack 2 Tiger 10.4.2 Front Side Bus (FSB) 800MHz 400MHz CPU Speed 2.0GHz 1.8GHz Hard Drive 160 GB 160 GB RAM 1 GB 512 MB Processor Intel

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work