• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS portfolio Extension

Extracts from this document...

Introduction

ITGS PORTFOLIO EXTENSION Ishaan Khanna Report Criterion N: Discussion And Analysis Of The Interview According to Mr.Paraskar, Wi-Fi technology has caught momentum in India in the last four years . In the year 2007, Wi-Fi spread widely in business and industrial sites. . Mr. Paraskar has been working in the cyber crime department for five years. He has come across various security problems in Wi-Fi networks such as hacking and received a large number of complaints based on this issue. Wi-Fi is used by most personal computer operating systems, video game consoles, laptops, smart phones and many other electronic devices. The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. As far as security loopholes of Wi-Fi are concerned, many Wi-Fi users do not secure their Wi-Fi networks. This makes the Wi-Fi network accessible to any outsider who has a Wi-Fi enabled device anywhere near the Wi-Fi network. Mr. Paraskar said that hacking into Wi-Fi networks is a very serious issue and a great amount of damage can be caused as a result of compromise in Wi-Fi networks. ...read more.

Middle

Wi-Fi is gaining popularity and it is being widely used in airports, hotels, restaurants etc. therefore it is very important to take security measures in order to secure networks and prevent hacking of networks. Due to lack of experience and strong security measures Wi-Fi hacking is becoming more and more prominent. The large Wi-Fi systems at airports, hospitals should be password protected and so should small organizations to prevent misuse of their IP address by hackers. Higher methods of encryption should also be used to prevent hacking. SSID is the name of a wireless local area network and it is sent out by a router, SSID broadcasting should be turned off because if someone knows the SSID it is easier for them to gain access to your Wi-Fi network. Research Questionnare 1) When did Wi-Fi technology catch momentum in India? 2) How many years have you been in the home affairs department? 3) How familiar are you with the security problems inherent in Wi-Fi 4) What kind of security loopholes is a Wi-Fi network open to? 5) What kind of security loopholes is a Wi-Fi network open to? 6) What amount of damage could be caused as a result of compromise in the Wi-Fi networks? ...read more.

Conclusion

Cyber crimes do not need to have stronger security measures so that only criminals are punished. 7) What are the measures that need to be taken to prevent the tapping and misuse of Wi-Fi networks? Passwords should be set by the owners when they establish the Wi-Fi networks so that outsiders cannot gain access to network and misuse it. The password should be changed from time to time and It should be ensured that no hacking is taking place. If there is any problem or case of hacking it should be immediately reported to the cyber crime department. Or use high orders of encryption so that tapping into these networks would become more difficult and this would make network more secure 8)How do you view the crime rate in the nation after the tremendous growth in Wi-Fi networks in India? The crime rate has almost doubled with the growth of Wi-Fi networks because of hacking and misuse of Wi-Fi. Networks by hackers and the other reason is that many people are not aware of Wi-Fi security and how to protect their networks from getting hacked 8) What order of punishments is awarded to cyber criminals guilty of their crime? There is an information technology act of India, this act considers the crime and order is directly proportional to the crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    By comparison, Ocado sells 20,000 products, roughly a quarter of which come from Waitrose. Amazon already sells groceries online in the US and has recently launched a similar service in Germany. Analysts, however, said shoppers would find it difficult to rely on the website for their weekly food shops as

  2. ITGS portfolio Education games

    This could result in shyness and a person turning into a introvert. Most of the games that are getting launched these days have too much of violence in it which causes a destructive and aggressive mind. The usage of computers should be made only when a adult is around so that one cannot misuse it.

  1. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    on the rest of the page, if something isn't right, the editor and manager of the page would be alerted. As an example the device could detect the words "Pete loves PANCAKE" after it was change then scan the rest of the entry for similarity in the words and phrases,

  2. Proyecto Personal - Anorexia y Bulimia

    tema tiene mucho que ver con la salud del ser humano y mi objetivo es ayudar a los dem�s, por lo cual tambi�n encontramos Comunidad y Servicio dado que al ofrecer mi ayuda estoy contribuyendo con mi sociedad. Conclusi�n Ahora que he concluido mi proyecto personal, puedo darme cuenta de su finalidad.

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    (Velasquez, 2005) 12:1-Yen Yuan asked about perfect virtue. The Master said, "To subdue one's self and return to propriety, is perfect virtue. If a man can for one day subdue himself and return to propriety all under heaven will ascribe perfect virtue to him.

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    Net Applications has released their August 2009 figures, which show that Windows XP still holds 71% market share. Even after eight years, Windows XP still remains the operating system for many users. 3 The most frequently used editions of Windows XP are 'Home edition', targeted at home users, and 'Professional', which has few additional features for business and enterprise users.

  1. Databases Portfolio

    One of those organizations is the health organization. Hospitals and health center are starting to use databases to save information about patients without having to take so much space. "More than 100,000 people in Kent have been added to the DNA database in the last five years."[BBC] With the DNA of the people saved, it becomes easier to

  2. Commentary on February the 17th

    Both of them are united at this time in their lives, in trying to help the mother give birth. The poem is set on a muddy slope, on a rainy, dreary morning. The morning seems to signify birth and new beginnings. However, this morning starts with a 'downpour, dishclout sunrise'.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work