• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS portfolio Extension

Extracts from this document...

Introduction

ITGS PORTFOLIO EXTENSION Ishaan Khanna Report Criterion N: Discussion And Analysis Of The Interview According to Mr.Paraskar, Wi-Fi technology has caught momentum in India in the last four years . In the year 2007, Wi-Fi spread widely in business and industrial sites. . Mr. Paraskar has been working in the cyber crime department for five years. He has come across various security problems in Wi-Fi networks such as hacking and received a large number of complaints based on this issue. Wi-Fi is used by most personal computer operating systems, video game consoles, laptops, smart phones and many other electronic devices. The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. As far as security loopholes of Wi-Fi are concerned, many Wi-Fi users do not secure their Wi-Fi networks. This makes the Wi-Fi network accessible to any outsider who has a Wi-Fi enabled device anywhere near the Wi-Fi network. Mr. Paraskar said that hacking into Wi-Fi networks is a very serious issue and a great amount of damage can be caused as a result of compromise in Wi-Fi networks. ...read more.

Middle

Wi-Fi is gaining popularity and it is being widely used in airports, hotels, restaurants etc. therefore it is very important to take security measures in order to secure networks and prevent hacking of networks. Due to lack of experience and strong security measures Wi-Fi hacking is becoming more and more prominent. The large Wi-Fi systems at airports, hospitals should be password protected and so should small organizations to prevent misuse of their IP address by hackers. Higher methods of encryption should also be used to prevent hacking. SSID is the name of a wireless local area network and it is sent out by a router, SSID broadcasting should be turned off because if someone knows the SSID it is easier for them to gain access to your Wi-Fi network. Research Questionnare 1) When did Wi-Fi technology catch momentum in India? 2) How many years have you been in the home affairs department? 3) How familiar are you with the security problems inherent in Wi-Fi 4) What kind of security loopholes is a Wi-Fi network open to? 5) What kind of security loopholes is a Wi-Fi network open to? 6) What amount of damage could be caused as a result of compromise in the Wi-Fi networks? ...read more.

Conclusion

Cyber crimes do not need to have stronger security measures so that only criminals are punished. 7) What are the measures that need to be taken to prevent the tapping and misuse of Wi-Fi networks? Passwords should be set by the owners when they establish the Wi-Fi networks so that outsiders cannot gain access to network and misuse it. The password should be changed from time to time and It should be ensured that no hacking is taking place. If there is any problem or case of hacking it should be immediately reported to the cyber crime department. Or use high orders of encryption so that tapping into these networks would become more difficult and this would make network more secure 8)How do you view the crime rate in the nation after the tremendous growth in Wi-Fi networks in India? The crime rate has almost doubled with the growth of Wi-Fi networks because of hacking and misuse of Wi-Fi. Networks by hackers and the other reason is that many people are not aware of Wi-Fi security and how to protect their networks from getting hacked 8) What order of punishments is awarded to cyber criminals guilty of their crime? There is an information technology act of India, this act considers the crime and order is directly proportional to the crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. SALES OF GOOD ACT

    If the goods are of a perishable nature the seller may exercise this right immediately. However the goods are of a non perishable nature the seller must give a notice in writing to the buyer for payment of the price & disclosing his intentions of reselling the goods.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Bibliography: 1. Wood, Zoe. "Amazon launches online groceries division as Ocado gears up for flotation." Guardian.co.uk. 7 July 2010. 10 Oct 2010. <http://www.guardian.co.uk/business/2010/jul/07/amazon-groceries-ocado-flotation> 2. Watrous, Lucinda. "Online Grocery Shopping: Pros and Cons." Bright Hub. 12 Feb 2010. 30 Sept 2010. <http://www.brighthub.com/money/personal-finance/articles/34470.aspx> 3. Blakemore, Erin. "Online Grocery Shopping." Love to know.

  1. ITGS portfolio Education games

    Excessive of these games can cause many side effects in terms of long term and short term. The long term issues concerned are that bad posture and RSI (repetitive strain injury) A user should not spend too much time in front of the computer screen as a result may get

  2. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    But usually the articles that are lock are the one that get mess with the most, which are usually those of celebrity. And while doing a research for school work, we usually don't research about celebrity. Recently if you have gone on Wikipedia's Microsoft you would have known that the

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    defining characteristic of "the gentleman" have no precise definition, thus some verses from the Lun Y� must be observed. First, it is to be established that the Confucian "Gentleman" practiced the following: self-respect, generosity, sincerity, persistence, and benevolence (Zukeran, 2002).

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    two big names in the market; two big corporations that have been competing for decades with each other. Mac OS X version 10.4 "Tiger" is the fifth major release of Mac OS X, Apple's desktop and server operating system for Macintosh computers.

  1. Databases Portfolio

    One of those organizations is the health organization. Hospitals and health center are starting to use databases to save information about patients without having to take so much space. "More than 100,000 people in Kent have been added to the DNA database in the last five years."[BBC] With the DNA of the people saved, it becomes easier to

  2. Commentary on February the 17th

    Both of them are united at this time in their lives, in trying to help the mother give birth. The poem is set on a muddy slope, on a rainy, dreary morning. The morning seems to signify birth and new beginnings. However, this morning starts with a 'downpour, dishclout sunrise'.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work