Verified Document

An Exploration Of Cyber Attacks In Wireless Protocols Research Paper

Wireless network security remains a priority for most organizations, governments as well as individuals today. This is more so the case given that in the past, malicious players have exploited existing vulnerabilities and sought to gain unauthorized access to wireless networks with an intention of intercepting data, interfering with packet/traffic in transit, and other nefarious reasons. This poses serious risk to those targeted by such attacks. It is for this reason that there exists the need to not only explore the vulnerabilities that ease the deployment of cyber-attacks on wireless protocols, but also highlight some of the techniques that have been employed in the past by attackers to compromise the integrity of wireless networks. There is also need to restate the relevance of keeping abreast with changes in technology so as to anticipate (and thwart) new ways and approaches used by cybercriminals to launch and/or successfully conduct attacks in wireless protocols.

Cyber-Attacks in Wireless Protocols

Technology and the Internet of Things (IOT) has changed the world in multiple formats. It has been a source of efficiency for businesses, helped address a wide range of inconveniencies that were commonplace in the past, and contributed towards making global interconnectedness a reality. However, as technology continues to advance, so does the risk of the same being used by criminal elements to further nefarious agenda. As a matter of fact, cyber criminals and other actors have in the past found new ways to target computer networks and information systems via the deployment of a wide range of offensive maneuvers. This is to say that as technology continues to evolve, so does cybercrime. This text concerns itself with cyber-attacks in wireless protocols. In so doing, it will identify the most common wireless protocol attacks and the most effective strategies that could be applied to prevent the said attacks. This is a topic worthy of exploration as cyber-attacks are capable of causing serious disruptions, occasioning financial loss, or even triggering catastrophes of almost unimaginable proportions.

History

From the onset, it is important to note that no unified (or standard) definition of cyber-attack has been formulated in the past. This is to say that the term has been defined in various formats by various commentators and authors in the past. According to Vacca (2016), a cyber-attack relates to attempts or efforts by unauthorized persons or parties to breach or gain access to a computer network or system so as to destroy, disable, alter, expose, or steal information - or other related reason such as destroying or compromising the digital assets of another party. On the other hand, the National Institute of Standards and Technology NIST (2022) defines a cyber-attack as a malicious activity concerted for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. Towards this end, cyber-attacks on wireless protocols could be conceptualized as acts of intrusion and/or penetration whose target essentially happens to be wireless networks.

Wireless networks have come a long way from the 7 device ALOHAnet (which could be considered the very first wireless network) in 1971 to the present days increasingly complex wireless network infrastructure that incorporates various wireless technologies including, but not limited to Wi-Fi (Osterhage, 2021). Prior to the introduction of wireless communication technology, network nodes were essentially connected via cables. As a consequence, for a malicious third party to perpetrate an attack, access (physical) to a network jack or cable was required. It is important to note that wireless networks made it possible for devices to roam (as well as sustain connectivity to a network) without having to tether the said networks to cables. As a result, wireless networks offered individuals, organizations as well as governments more practical as well as faster ways to conduct their affairs. With the increased utilization of wireless networks, cyber-attacks on wireless protocols have become rather common. This has been further enabled by the relative vulnerability of wireless networks to intruders. Today, unlike was the case with wired networks, no physical access is needed to devices on a network for an intruder to perpetrate an attack.

Relevance to the Cyber Security Field

Cyber-attacks in wireless protocols have the potential to cause victims great loss on multiple fronts. For instance, successful penetration or intrusion could result in disruption of operations that could in turn cause financial loss and/or reputation damage. According to Vacca (2016), in some instances, disruption of the normal operations of an organization or agency as a consequence of cyber-attacks in wireless protocols could derail normal functions as well as activities to such a huge extent that it triggers a chain of events that disrupt the delivery of crucial services. This is more so the case when the target of an attack of this nature is a government agency. When cyber-attacks in wireless protocols result in interception and theft of crucial information (i.e. via eavesdropping or spoofing and session hijacking), the end result could be misuse of the gathered data to commit fraud. Some business entities have in the past taken serious reputational hits after falling victim to data breaches. In such a case, those who have had their information stolen and misused (such as suppliers and customers) may find it difficult to do business again with the target company.

It therefore follows that organizations and individuals alike should embrace the strategies that have been highlighted in this text in an effort to minimize their risk of becoming victims of wireless network attacks. With this in mind, it would be prudent...

…indicates, however, most businesses and corporations appear ill-equipped to stop or even detect vulnerabilities that expose their wireless networks to attacks. More specifically, the author is of the opinion that many businesses fail to perform a thorough risk analysis which means those vulnerabilities are not identified and addressed (Fiky, 2022, p. 253). This needs to change. Organizational leaders should be sensitized on the cost of their slackness on this front. This way, organizations can see the testing of the security of their systems i.e. by running vulnerability scans as an important undertaking.

2. It should be noted that cyber-attacks in wireless protocols continue to evolve in complexity. For this reason, there is need for individuals and organizations alike to ensure that they constantly update themselves on the new trends in this realm. More specifically, organizations and the various critical agencies should not shy away from allocating adequate resources towards not only the development as well as implementation of appropriate wireless security strategies, but also the search for existing vulnerabilities with an aim of fixing them. Individuals must also take wireless network security seriously. This, according to Kizza (2017), is more so the case we continue into a future in which everything from our phone to our refrigerator operates using a wireless internet connection... (165). There are various companies that offer solutions targeting retail and individual clientele.

3. There may be need for stakeholders to unite in the war against cyber criminals and other bad actors who are keen on undermining the wireless data connections. Key stakeholders on this front are inclusive of, but they are not limited to; governments/policymakers, software developers and vendors, IT professionals, cyber security companies, business entities, nonprofit organizations, citizens, etc. Collaborative efforts in this case could take place in the realms of information sharing, interventions development, etc.

Conclusion

In the final analysis, it would be prudent to note that as has been demonstrated in this text, the relevance of identifying vulnerabilities and employing various strategies to prevent cyber-attacks on wireless protocols cannot be overstated. This is more so the case given the adverse effects of successful penetration or intrusion attempts. It is likely that with the continued advancement of technology, cyber-attacks in wireless protocols will become even more complex. All stakeholders should unite in efforts to frustrate attempts by bad actors and hackers to undermine the integrity of wireless data connections. There is need for the said stakeholders to be cognizant of the fact that cyber-attacks in wireless protocols continue to evolve in complexity as this would pave the way for the development of more effective solutions to combat these kinds of attacks. It is impossible to tell what innovative approaches cyber criminals will employ next as they seek to advance their nefarious agenda via the intrusion and/or…

Sources used in this document:

References


Fiky, A.H. (2022). Wireless Penetration Testing: Up and Running. BPB Publications.


Kizza, J.M. (2017). Guide to Computer Network Security. Springer.


Mayers, R. (2019). Wireless Network Security. IP.


National Institute of Standards and Technology – NIST (2022). Cyber Attack. https://csrc.nist.gov/glossary/term/cyber_attack

Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Attacks on Other Countries
Words: 205 Length: 1 Document Type: Essay

Cyber Terrorism�Albania Cuts Diplomatic Ties with Iran after July Cyberattack�https://www.cyberscoop.com/albanian-cyberattack-diplomatic-iran/On July 15th, 2022, Iranian-backed hacking group �Homeland Justice� attacked with ransomware and malware multiple Albanian government websites in order to facilitate the geographic expansion of Iranian disruptive cyber operations, conducted against a NATO member state. This is important because evidently Iran will carry out disruptive and destructive cyber attacks as well as complex information operations globally to disrupt NATO countries�

Dod and Cyber Attacks
Words: 1099 Length: 3 Document Type: Term Paper

gathered on the DOD The tools and a description of the how they are used What sort of attacks would work in this case? Give some examples and how you would carry them out What social engineering and physical security aspects were discovered / devised? Give a detailed explanation What methods could you employ to help secure these vulnerabilities? What suggestions would you make to the organization if you were a penetration tester? Attack

2007 Estonia Cyber Attacks
Words: 2990 Length: 10 Document Type: Term Paper

Estonia Cyber Attacks 2007 2007 Estonian Cyber-war This is the information age. In this age, the Internet has smoothened the progress of spectacular increases in global interconnectivity and communication. This form of globalization also yielded benefits for Estonia by improving the standard of living of its people. However, other than benefits, it has also ascended the availability of new weapons of confrontation for groups who have been seeking and opposing certain Estonian

Technologies Designed to Secure Networks From Cyber-Attacks
Words: 607 Length: 2 Document Type: Essay

Technologies Designed to Secure Networks from Cyber-Attacks In this paper, I examine different approaches to security designs intended to protect the integrity of the information contained on network databases in light of recent technological developments. Traditionally, network security has been designed either to protect the database of the network or to protect the specific applications that are executed upon the network. However, in the last decade, the implementation of Web

Assessing the Damage of Cyber Attacks Using Norse Map
Words: 652 Length: 2 Document Type: Essay

Norse Map I looked at the live cyber attacks on map.norsecorp.com at 9:20 AM on 30 Jan 2016. As the attacks happened, the majority of them originated in China (more than 400 attacks were sent in just a matter of minutes) and the majority of the targets were in the U.S. (about 1000 hits in as much time coming from several countries in the East and in Europe). The U.S.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now