How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets?

Wireless insecurity is a major problem worldwide. This dates back to the time when cordless phones were invented and this problem was assumed to be over. This was because these phones were operating using broader spectrum modulation and vendors claimed that it was impossible to build a receiver that would tap information transmitted in this form. This was not true because it was found that although RF receivers operated at a lower band and this other one was working at a wideband a person with a scanner, working at the same frequency with these receivers could easily access calls for other people.

The extent of the security problem in a network depends on the kind of network one is using. In a home situation where the kind of information one is handling is not that sensitive. It requires a simple security system installed. In organizations, such as banks, which deal with data that is confidential, they need a strong security system installed to ensure information does not get to unauthorized users. This is because they can tamper with the information and cause severe damage to such organizations.

Due to the need to try and stop this danger of tampering with information transmitted through wireless networks, various techniques were developed to curb this problem. This became a very challenging issue in IT technology with the advancement of the technology as the hackers invented other means of getting through the security system into the network. So, a need to come up with more effective security systems continued to arises. Some of these security systems, which were established to limit this problem of wireless insecurity included;

The Filtering of MAC Addresses

This was developed to ensure that before a user is allowed a link to a wireless network it is checked to ensure that it is one of the good Mac addresses This method failed and could not work as the IT department was not the one responsible for allowing wireless cards to client and therefore could not be able to keep a company list of Mac addresses. Hackers with good Mac addresses were able to access the network. Allowing access to Stations that were considered to have the right Mac addresses could not guarantee security as other programs that tap information such as Trojan horses could have been installed which grant access to the wireless network by the hackers.

Assigning fixed IP Addresses to devices

Most people use dynamic IP addresses because it’s easy and faster to put up. This can make their network easily attacked by unauthorized users as hackers can get similar IP addresses from DHCP groups. Hence DHCP on the access point should be turned off and set to a private range of IP addresses that should agree with the connected components. This IP address will bar your computer from being accessed from the Internet.

Alter the default password and username of the manager

The names and passwords used by users to set up their equipment should be changed frequently as they are easy and are known by hackers on the internet.

Use of encryption

Encryption is the technology, which encodes or shatters messages transmitted by the wireless network such that one cannot easily interpret them. So, a very powerful form of encryption should be used and all the equipment connected to your LAN should have the same encryption setting.

Enable MAC Address filtering

Due to the failure of address filtering to offer better security services to wireless networks. Ensure it only addresses of the equipment connected to your network are allowed access. This will help to keep away unauthorized users accessing your network, which will boost the safety of your network.

Enable firewalls on each computer and the router

You should make sure that your router’s firewall is on and ensure that there are extra personal firewall programs on your systems, which are connected to the router to enhance the security of the network. This acts as a booster to your security system.

The other problem that is associated with a wireless network is the cost factor. Most of the wireless networks are expensive to install and maintain, unlike the wired network that is cheap to install and maintain. This factor is due to the high costly equipment needed in a wireless network. The other factor that also contributes to m high cost of the network is because not many companies have been able to develop the technology and hence the competition is limited to the few companies that monopolize this network.

Answer by Academic.tip's expert
An answer to this question is provided by one of our experts who specializes in technology & it. Let us know how much you liked it and give it a rating.

Cite this page

Select a citation style:

References

Academic.Tips. (2022) 'How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets'. 1 September.

Reference

Academic.Tips. (2022, September 1). How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets? https://academic.tips/question/how-is-the-trend-toward-open-systems-connectivity-and-interoperability-related-to-business-use-of-the-internet-intranets-and-extranets/

References

Academic.Tips. 2022. "How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets?" September 1, 2022. https://academic.tips/question/how-is-the-trend-toward-open-systems-connectivity-and-interoperability-related-to-business-use-of-the-internet-intranets-and-extranets/.

1. Academic.Tips. "How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets?" September 1, 2022. https://academic.tips/question/how-is-the-trend-toward-open-systems-connectivity-and-interoperability-related-to-business-use-of-the-internet-intranets-and-extranets/.


Bibliography


Academic.Tips. "How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets?" September 1, 2022. https://academic.tips/question/how-is-the-trend-toward-open-systems-connectivity-and-interoperability-related-to-business-use-of-the-internet-intranets-and-extranets/.

Work Cited

"How is the trend toward open systems, connectivity, and interoperability related to business use of the Internet, intranets, and extranets?" Academic.Tips, 1 Sept. 2022, academic.tips/question/how-is-the-trend-toward-open-systems-connectivity-and-interoperability-related-to-business-use-of-the-internet-intranets-and-extranets/.

Copy