Wireless is the current standard for tablets, laptops, mobile devices, and many

    Wireless is the current standard for tablets, laptops, mobile devices, and many of the available smart devices around the world. Read the following article on top applications and techniques used by today’s hackers.
    Shankdhar, P. (2018). 20 popular wireless hacking tools [updated for 2018]. Retrieved from http://resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/#gref
    Although wireless networks offer great flexibility, they have their security problems. A hacker can sniff the network packets without having to be in the same building where the network is located. As wireless networks communicate through radio waves, a hacker can easily sniff the network from a nearby location.
    Most attackers use network sniffing to find the SSID and hack a wireless network. When our wireless cards are converted in sniffing modes, they are called monitor mode.
    Obviously, networks should avoid using WEP security keys to secure networks. Discuss why WEP is invalid for use. Why is WEP not acceptable for protecting sensitive information?
    Given that the current status of key generation for WPA and WPA2, what further steps are needed to secure networks from threat actors?
    Discuss potential issues with the current state of wireless keys, SSIDs and how threat actors can get rogue access points and spoof MAC addresses to gain entry inside the wireless domain. Be sure to outline threats both internally and externally. You should also seek to discuss countermeasures against these threat actors.
    Be sure to support your statements with logic and argument, citing any sources referenced. Post your initial response early and check back often to continue the discussion. Be sure to respond to at least two of your peers’ posts as well.

    Leave a Reply

    Your email address will not be published. Required fields are marked *