• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS portfolio Extension

Extracts from this document...


ITGS PORTFOLIO EXTENSION Ishaan Khanna Report Criterion N: Discussion And Analysis Of The Interview According to Mr.Paraskar, Wi-Fi technology has caught momentum in India in the last four years . In the year 2007, Wi-Fi spread widely in business and industrial sites. . Mr. Paraskar has been working in the cyber crime department for five years. He has come across various security problems in Wi-Fi networks such as hacking and received a large number of complaints based on this issue. Wi-Fi is used by most personal computer operating systems, video game consoles, laptops, smart phones and many other electronic devices. The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. As far as security loopholes of Wi-Fi are concerned, many Wi-Fi users do not secure their Wi-Fi networks. This makes the Wi-Fi network accessible to any outsider who has a Wi-Fi enabled device anywhere near the Wi-Fi network. Mr. Paraskar said that hacking into Wi-Fi networks is a very serious issue and a great amount of damage can be caused as a result of compromise in Wi-Fi networks. ...read more.


Wi-Fi is gaining popularity and it is being widely used in airports, hotels, restaurants etc. therefore it is very important to take security measures in order to secure networks and prevent hacking of networks. Due to lack of experience and strong security measures Wi-Fi hacking is becoming more and more prominent. The large Wi-Fi systems at airports, hospitals should be password protected and so should small organizations to prevent misuse of their IP address by hackers. Higher methods of encryption should also be used to prevent hacking. SSID is the name of a wireless local area network and it is sent out by a router, SSID broadcasting should be turned off because if someone knows the SSID it is easier for them to gain access to your Wi-Fi network. Research Questionnare 1) When did Wi-Fi technology catch momentum in India? 2) How many years have you been in the home affairs department? 3) How familiar are you with the security problems inherent in Wi-Fi 4) What kind of security loopholes is a Wi-Fi network open to? 5) What kind of security loopholes is a Wi-Fi network open to? 6) What amount of damage could be caused as a result of compromise in the Wi-Fi networks? ...read more.


Cyber crimes do not need to have stronger security measures so that only criminals are punished. 7) What are the measures that need to be taken to prevent the tapping and misuse of Wi-Fi networks? Passwords should be set by the owners when they establish the Wi-Fi networks so that outsiders cannot gain access to network and misuse it. The password should be changed from time to time and It should be ensured that no hacking is taking place. If there is any problem or case of hacking it should be immediately reported to the cyber crime department. Or use high orders of encryption so that tapping into these networks would become more difficult and this would make network more secure 8)How do you view the crime rate in the nation after the tremendous growth in Wi-Fi networks in India? The crime rate has almost doubled with the growth of Wi-Fi networks because of hacking and misuse of Wi-Fi. Networks by hackers and the other reason is that many people are not aware of Wi-Fi security and how to protect their networks from getting hacked 8) What order of punishments is awarded to cyber criminals guilty of their crime? There is an information technology act of India, this act considers the crime and order is directly proportional to the crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. Commentary on February the 17th

    The remoteness of the place seems to emphasize that the poet is the only one who can help the mother. The terrain seems to be a hilly, undulated area, as seen in the lines '[I] laid her, head uphill' and 'mudded slope'.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    to the health information, so that if issues do arise, it would be easier to control the flow of information. For doctors and other health specialists, it is crucial and the law to keep health information of clients private and secured.

  1. Databases Portfolio

    One of those organizations is the health organization. Hospitals and health center are starting to use databases to save information about patients without having to take so much space. "More than 100,000 people in Kent have been added to the DNA database in the last five years."[BBC] With the DNA of the people saved, it becomes easier to

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    4"Look for the locked padlock icon at the bottom of your browser window to see if you're protected." The best solution for online grocery shopping or for any type of online shopping is to stay on your toes with purchases and to keep personal information safe from other people.

  1. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    The Mac address of the laptop should be entered to the Wi-Fi box and only those particular devices familiar to the system may be able access the Wi-Fi network, with the help of the security password. This is one more way of keeping the network secure.

  2. ITGS portfolio Education games

    Types of educational games: - Board games: - These games are played with counters or pieces that are moved across the board, or removed as per the game goes. Card games: - Any game that is using playing cards as a method to teach are known as educational games.

  1. Information Technology in a Global Society - article commentary "What are the security risks ...

    A calculator option is also present for quick calculation when needed [Diagram 2 ii)]. Diagram 2 (Apple, 2010) An iPhone Criteria C: The Impact of the Issue Mobile devices offer employees a way to work when not in the workplace itself, and most employees would have a Smartphone.

  2. Uses of Encryption

    It is this feature that makes public-key cryptography so desirable and distinguishes it from secret key cryptography as it eliminates the need for the secure transmission of keys. What kinds of information does Echelon collect? Echelon is a secret system operated by the USA and other countries that is capable

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work