Wireless network security?

Credit payments on mobile phones, superior mobility and wi-fi calls are bright prospects of wireless Internet. But there are many new risks that arise associated with this breakthrough.

Picture 1 of Wireless network security?
Credit payments on mobile phones, superior mobility and wi-fi calls are bright prospects of wireless Internet. But there are many new risks that arise associated with this breakthrough.

A radio world is forming and of course still unstable. When we speed up communications during peak days, you and I are certainly hard to avoid the attacks of advertising and commercial services on the wireless network.

Risk

First of all, there is the risk of digital hackers. Although this issue has continued to increase during the past decade as more and more personal information is stored on mobile devices and wired Internet connections. And now, the wireless Internet has added a lot of complexity to this mess.

On October 26, Hartsfield-Jackson International Airport in Atlanta, USA, launched its Wi-Fi (wireless fidelity) service, making it the largest mobile Internet access point in the US. Anyone who has a laptop (laptop) can easily communicate with the global Internet. Although expert Kirsten Tagami said users can be assured of access because there are additional firewalls and security support, but the risks are very high, especially when those are Users using commercial communications connections often know little about these software manipulations and techniques.

At any wireless Internet access point, users may be exposed to security risks. Earlier this year, AirDefence Local Network Security Company plans to focus on this weakness by examining vulnerable vulnerabilities of wireless access points. In a network security consolidation campaign, AirDefence experts can log on easily to a hotel or company wireless network and can exploit the parameters when a mail exchange occurs. They also broke into any internal communication system when there was an audience.

Keeping in touch is the strength of the information technology era, and the mobile phone is not merely a means for you to exchange information, but has even become a soulmate of many people. It stores a wealth of information from employers and communicators, from credit card numbers, bank accounts to personal information of friends and relatives. However, hackers can easily hack and steal this information.

And the solution

The answer comes in 3 words: design (design), adjust (regulate) and educate (educate).

Security measures that customers can easily manipulate should be carefully designed and should be available in any wireless connection device. This is extremely important for network security solution designers. For example, BellSouth Company recently launched a number of wireless services in selected access points in the state of Georgia. The high-speed wireless Internet project is also being targeted at the New Orleans area, a really difficult infrastructure for a wired Internet after Hurricane Katrina. In particular, BellSouth is addressing the highest security issues in different ways, such as the application of advanced technology for direct digital communication from customers' computers to BellSouth's main management stations, using code The unique identifier of the registered audience and the production of specially designed equipment is only appropriate for the BellSouth network.

Finally, it is equally important to recommend wireless network providers and customers about this risk. And, much is expected of the action plan to control wireless security risks when the wireless security summit will take place at the Georgia Information Technology Security Center. on November 15 here .

D.Nguyen Hung

Update 14 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment