• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS portfolio Extension

Extracts from this document...

Introduction

ITGS PORTFOLIO EXTENSION Ishaan Khanna Report Criterion N: Discussion And Analysis Of The Interview According to Mr.Paraskar, Wi-Fi technology has caught momentum in India in the last four years . In the year 2007, Wi-Fi spread widely in business and industrial sites. . Mr. Paraskar has been working in the cyber crime department for five years. He has come across various security problems in Wi-Fi networks such as hacking and received a large number of complaints based on this issue. Wi-Fi is used by most personal computer operating systems, video game consoles, laptops, smart phones and many other electronic devices. The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. As far as security loopholes of Wi-Fi are concerned, many Wi-Fi users do not secure their Wi-Fi networks. This makes the Wi-Fi network accessible to any outsider who has a Wi-Fi enabled device anywhere near the Wi-Fi network. Mr. Paraskar said that hacking into Wi-Fi networks is a very serious issue and a great amount of damage can be caused as a result of compromise in Wi-Fi networks. ...read more.

Middle

Wi-Fi is gaining popularity and it is being widely used in airports, hotels, restaurants etc. therefore it is very important to take security measures in order to secure networks and prevent hacking of networks. Due to lack of experience and strong security measures Wi-Fi hacking is becoming more and more prominent. The large Wi-Fi systems at airports, hospitals should be password protected and so should small organizations to prevent misuse of their IP address by hackers. Higher methods of encryption should also be used to prevent hacking. SSID is the name of a wireless local area network and it is sent out by a router, SSID broadcasting should be turned off because if someone knows the SSID it is easier for them to gain access to your Wi-Fi network. Research Questionnare 1) When did Wi-Fi technology catch momentum in India? 2) How many years have you been in the home affairs department? 3) How familiar are you with the security problems inherent in Wi-Fi 4) What kind of security loopholes is a Wi-Fi network open to? 5) What kind of security loopholes is a Wi-Fi network open to? 6) What amount of damage could be caused as a result of compromise in the Wi-Fi networks? ...read more.

Conclusion

Cyber crimes do not need to have stronger security measures so that only criminals are punished. 7) What are the measures that need to be taken to prevent the tapping and misuse of Wi-Fi networks? Passwords should be set by the owners when they establish the Wi-Fi networks so that outsiders cannot gain access to network and misuse it. The password should be changed from time to time and It should be ensured that no hacking is taking place. If there is any problem or case of hacking it should be immediately reported to the cyber crime department. Or use high orders of encryption so that tapping into these networks would become more difficult and this would make network more secure 8)How do you view the crime rate in the nation after the tremendous growth in Wi-Fi networks in India? The crime rate has almost doubled with the growth of Wi-Fi networks because of hacking and misuse of Wi-Fi. Networks by hackers and the other reason is that many people are not aware of Wi-Fi security and how to protect their networks from getting hacked 8) What order of punishments is awarded to cyber criminals guilty of their crime? There is an information technology act of India, this act considers the crime and order is directly proportional to the crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Brian McBride, managing director of Amazon.co.uk, said the division offered customers the chance to buy staples such as washing powder and toilet roll in bulk, or shop for gourmet and organic products such as pheasant, partridge and wheels of cheese.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Both new and old staff members from health offices and hospitals should be reminded the privacy rules for inheriting personal health information from clients and each all information secure. The Health Insurance Portability and Accountability Act (HIPAA) is an act that helps deal with privacy and security issues regarding the

  1. Is wi-fi safe? Wi-Fi is widely used in mobile phones, gaming devices, house networks ...

    It covers the IEEE 802.11 technologies. Wi-Fi technologies can connect to most of the personal computers, which are modern, and the most advanced gaming devices such as play stations and laptops as well. [Wikipedia.org] It makes the work much easier as any one can connect to the Internet sitting in

  2. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    The Mac address of the laptop should be entered to the Wi-Fi box and only those particular devices familiar to the system may be able access the Wi-Fi network, with the help of the security password. This is one more way of keeping the network secure.

  1. ITGS portfolio Education games

    This could result in shyness and a person turning into a introvert. Most of the games that are getting launched these days have too much of violence in it which causes a destructive and aggressive mind. The usage of computers should be made only when a adult is around so that one cannot misuse it.

  2. Information Technology in a Global Society - article commentary "What are the security risks ...

    they are not allow to have mobile devices it would be very difficult for them to communicate with their family or friends when ever and where ever they want. This will cause a lot of pressure on to the employees, because they would feel like they are trap and when they are stress they don't have an outlet.

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    Particularly in the international trades, such as a banker, or MNC?s which require someone to translate from big chains abroad. Other fields such as a translator, health care involving foreign patients etc?. all look for people speaking a second language.

  2. Terrorism and hijacking in India and Pakistan.

    Although President Reagan praised the determined action of the Pakistani commandos, his feeling of gratification was not shared by the top executives of Pan Am airlines, which suspended all flights to Karachi until they received a proper explanation for the security lapse.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work