Nowadays, wireless technologies are widely used for data transmission in computer networks of any scale and level of complexity. They make it possible to access the web in various situations and places – in a cafe, on the street, at the airport, and in transport. This ensures the maximum usability of the possibilities that the Internet provides. However, the downside to this accessibility is the exposure of user devices, data, and software to various types of threats, creating problems for investigators. Gaining access to a local wireless network allows attackers to steal confidential information and personal data and distribute malware.
In turn, as far as directly addressing cybercrime, in some cases, only good old policing work, such as checking neighborhoods for descriptions and license plates of suspicious vehicles seen in the area, can provide investigators with information about the suspect’s identity. Haynes asserts that to combat the anonymity and potential security it offers to cybercriminals, some cities have required businesses to secure their networks. However, this is unlikely to reduce cybercrime since it will not be difficult for violators to break into a wireless network.
In this regard, it is vital to carry out educational work among the population to increase information literacy. Cruz-Cunha and Mateus-Coelho highlight methods such as selective use of public wireless networks, WPA / WPA2, and VPN. First, network clients need to try not to use public wireless networks to access important resources and transfer confidential information. Secondly, a user should only connect to those networks where WPA / WPA2 encryption mechanisms are used.
Thirdly, before using a wireless network, a user should ensure that an intruder does not organize it and check the network’s name from the staff. Fourth, network clients should use a virtual private network (VPN). Furthermore, it would be correct to restrict the ability to automatically connect to existing public networks and disable the search mode for wireless networks when a Wi-Fi connection is not required.