Why do we need security on our computer? One might wonder when did the Internet started? Or what is an Internet? The computers are a huge phenomenon in today’s society. The computers however, were not always so fast and advanced. During late 1960’s ARPANet created the Internet. Internet consists of thousands of smaller network. The main purpose was to access data quickly. First, it’s was private and only few scientist can use it but what made it famous was the growth of computer industries by the mid-1980. It was easiest way for company to communicate with customers. As Internet got famous and became available to public some company like Microsoft and Netscape wanted to develop a browser. At that time people didn’t knew the risk of using Internet and had no knowledge of their security. Internet got so famous in every short amount of time that people forgot about the bad side of Internet. As computer gets famous day-by-day it will get harder and harder to stop the viruses. As more and more people used Internet, Hackers had more fun to steal the information. There are many different types of attack that computer can have so by late-80s securing the network was main priority. In order to secure the network information security field was in major demands. By the 21st century everybody had computer and was connected to the Internet, which was good thing and also bad thing. A good thing was everyone was connected to the world …show more content…
“ leeching is using another persons wireless network without that persons permission. Seeking out inprotexted newtowwrkd by using sniffer hardware and finding targets in the neighborhood.” Cracking wireless encryption is the way to stop casual leeching. Mostly used encryption are WPA, WEP and WPA 2. Rough acess point is when unauthorized wireless acess point attacks wireless connection and leaves harmful malware stuff . Solution to this is to have a firewall built around network to prevent unauthorized acess. Evil twin attack is used to fool people into logging into a rougue acess point and then spread from there. Its main purpose is to steal passwords and other sensative information. It works same way as phishing which is why its also known as wireless phishing attack. To prevent this you have to be careful of where and how you acess wireless acess