• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS portfolio Extension

Extracts from this document...

Introduction

ITGS PORTFOLIO EXTENSION Ishaan Khanna Report Criterion N: Discussion And Analysis Of The Interview According to Mr.Paraskar, Wi-Fi technology has caught momentum in India in the last four years . In the year 2007, Wi-Fi spread widely in business and industrial sites. . Mr. Paraskar has been working in the cyber crime department for five years. He has come across various security problems in Wi-Fi networks such as hacking and received a large number of complaints based on this issue. Wi-Fi is used by most personal computer operating systems, video game consoles, laptops, smart phones and many other electronic devices. The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. As far as security loopholes of Wi-Fi are concerned, many Wi-Fi users do not secure their Wi-Fi networks. This makes the Wi-Fi network accessible to any outsider who has a Wi-Fi enabled device anywhere near the Wi-Fi network. Mr. Paraskar said that hacking into Wi-Fi networks is a very serious issue and a great amount of damage can be caused as a result of compromise in Wi-Fi networks. ...read more.

Middle

Wi-Fi is gaining popularity and it is being widely used in airports, hotels, restaurants etc. therefore it is very important to take security measures in order to secure networks and prevent hacking of networks. Due to lack of experience and strong security measures Wi-Fi hacking is becoming more and more prominent. The large Wi-Fi systems at airports, hospitals should be password protected and so should small organizations to prevent misuse of their IP address by hackers. Higher methods of encryption should also be used to prevent hacking. SSID is the name of a wireless local area network and it is sent out by a router, SSID broadcasting should be turned off because if someone knows the SSID it is easier for them to gain access to your Wi-Fi network. Research Questionnare 1) When did Wi-Fi technology catch momentum in India? 2) How many years have you been in the home affairs department? 3) How familiar are you with the security problems inherent in Wi-Fi 4) What kind of security loopholes is a Wi-Fi network open to? 5) What kind of security loopholes is a Wi-Fi network open to? 6) What amount of damage could be caused as a result of compromise in the Wi-Fi networks? ...read more.

Conclusion

Cyber crimes do not need to have stronger security measures so that only criminals are punished. 7) What are the measures that need to be taken to prevent the tapping and misuse of Wi-Fi networks? Passwords should be set by the owners when they establish the Wi-Fi networks so that outsiders cannot gain access to network and misuse it. The password should be changed from time to time and It should be ensured that no hacking is taking place. If there is any problem or case of hacking it should be immediately reported to the cyber crime department. Or use high orders of encryption so that tapping into these networks would become more difficult and this would make network more secure 8)How do you view the crime rate in the nation after the tremendous growth in Wi-Fi networks in India? The crime rate has almost doubled with the growth of Wi-Fi networks because of hacking and misuse of Wi-Fi. Networks by hackers and the other reason is that many people are not aware of Wi-Fi security and how to protect their networks from getting hacked 8) What order of punishments is awarded to cyber criminals guilty of their crime? There is an information technology act of India, this act considers the crime and order is directly proportional to the crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Authentication and authorization are two keys words for a user to identify. If the user has a password or something to confirm their identity, then it would decrease the chance of hacking. As for authorization, it is important for the client to limit the amount of people who have access

  2. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    proportioned;" whereas those things that are also called good such as wealth, health, beauty and strength are only truly good if connected with virtue, otherwise they are just "mortal goods" susceptible to evils (Dillon, 1993). Thus the one is only truly good if abiding by absolute virtue, but anything but that is only as good as the connection between them.

  1. ITGS Portfolio 1

    DeCicco, a Detroit based car expert was asked if the green cars will affect the US economy standards. DeCicco answered " I get this question a lot and the truth is that it's a very unhelpful and distracting issue. Fuel cell technology is very speculative.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    This also applies to online grocery shopping. As technology provides convenience and efficiency for people, it is also affecting us in a negative way by minimizing the need for interactions. Communication will be affected, and not only that but also daily basic skills, like addition and subtraction, because credit cards are always being used during transactions when purchasing online groceries, basic math is no longer practiced.

  1. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    The Mac address of the laptop should be entered to the Wi-Fi box and only those particular devices familiar to the system may be able access the Wi-Fi network, with the help of the security password. This is one more way of keeping the network secure.

  2. Is wi-fi safe? Wi-Fi is widely used in mobile phones, gaming devices, house networks ...

    It covers the IEEE 802.11 technologies. Wi-Fi technologies can connect to most of the personal computers, which are modern, and the most advanced gaming devices such as play stations and laptops as well. [Wikipedia.org] It makes the work much easier as any one can connect to the Internet sitting in

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    They also taught how to break out of a controlling relationship explaining that help is available for those who seek it. We were also taught about the intricacies of a relationship, and the importance of mutual respect and not mistreating anyone else.

  2. Terrorism and hijacking in India and Pakistan.

    That apart, when power seemed to be failing on the aircraft and the hijackers asked for power to be restored, the authorities did not comply. They filed to realize the panic effect of sudden darkness on the hijackers. When the lights failed, the hijackers started shooting indiscriminately.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work