Discuss why sensitive information should not be sent over the Wireless Application Protocol.
Accessing the internet or a network through a Wireless Application Protocol is fast, convenient and helps people increase their mobility. Their devices are no longer dependent on cables so they can be moved in the whole wireless coverage area. In business, using the wireless application protocols allowed a better control of the operations and a higher speed on taking decisions. Employees can now send and receive information in real-time. In the past, they had to get to their office to synchronize their data. But while they are happy to send their XXXX XXXX XXX easy from everywhere XXXX XXX, XXXXXXXXX wait to XXX their hand XX XXXX XXXXXXXXXXX and XXX it for XXXXX own benefit. The XXXX hacker XXX XXXXXXX XX purpose here. XXX companies can XXXX XXXX XXX XXXX XX an intruder in this XXXX. XX XXXX, FCC started an XXXXXXXXXXXXX after XXXXXX recognized it had XXXXXXXXX XXXXXXX and sensitive information XXXX XXXXXXXXX wireless networks (XXXXX, 2014). "Unsecured" is a XXXXXX XXXX in this context. "Unsecured" XXXXX XXXX a XXXXXXX with no XXXXXXXX at all or XXX XXXX a XXXXXXXX XXXXXXXXX weak XXXXXX for XXXXXX to XXXXX XXXX it and grab the XXXXXXXXXXX. Meanwhile, the public XXXXXXXX XXXXXXXXX are XXX legally obligated to XXXXXX XXXXX XXXXXXX XXX to XXXXXXXXX a XXXXXX data XXXXXXXX process (XXXX, 2016). XXX XXX all XXXXXXXX XXXXXXXXXXX XXXXXXXXX XXX established through a XXXXXX and unsecured XXXXXXXX network. Some companies XXXX want XX increase XXX XXXXXXXX XX their XXXXXXXXX in the office XXXXXXXX XXX XXXXXXXX access to the XXXXX intranet network XX XXXXX local XXXXXXXX XXXXXX XXXXXX. However, this solution XX XXX so safe. Even XX XXX machines XXXX encrypt the XXXX XXXX XXX received, the wireless XXXXXXX XXXX XXXXX be more vulnerable XXXX a conventional one (XXXX, XXXX). X cable-based intranet network can be XXXXXXX isolated XXXX the XXXXXXXX or XXXXX networks, XXXXXX them much XXXXX XXXX XXXXXXXXXXXX access. X XXXXXXXX-XXXXX XXXXXXXX XXXXXXX XXX XX hacked from every physical location situated in the coverage XXXX. XXXXXXXXX, XXX XXXXXX XXX XXX and XXXXXXX his own XXXXXX on that network, XXXXXXXXX, XXXXXXXXX information should XXX XX XXXX over XXX Wireless XXXXXXXXXXX XXXXXXXX, XXXXXXXXXX over XXXXXXXXX XXXX.
XXXXXXXXXX
XXXX, J. (2016),Security XXXXXX XX WiFi - How it Works, AlienVault, published on XXXXXXXX 12, 2016, XXX retrieved XXXX XXXXXXXXXX.com/blogs/security-essentials/security-issues-of-wifi-how-it-XXXXX
Voigt, C. (XXXX). XX-fi security: Shaping XXXX XXXXXXX XXXXX. XXXXXXX Communications Law Journal, XX(3), 537.
XXX
Authentication XXX authorization are two XXXXXXXXX concepts but XXXX XXXXXXXXX XXXX XXXXXXXX to XXXXXXX the XXXXXXXX XX the XXXXXXXX. In simple XXXXX, XXXXXXXXXXXXXX reveals XXX identity of the network user or XXXXXXX XXX the XXXXXXXXXXXXX XXXX XXX limits for XXXX it can XXXXXX XXX modify XX XXXX network (XXXX, 2009). The following example XXXX help XXX XXXXXXX XXXXXXXXXX the two concepts XXXX XXXXXX. John reserved a table XXX two at a XXXXXXXXXX by the XXXXX. XXXX he XXXXXXX XX XXX restaurant, the XXXXXXX asked his XXXX XXX XXXXXXXXXXX XXXXXX XXX the table. XX asking XXX name, the greeter was XXXXXX XXXX XX XXXXXXXXXXXX. By checking his XXXXXXXXXXX, the greeter XXXX that XXXX XXX authorized XX XXXXXX two XXXXX at the XXXXXXXXXX, XXX XXX XXX XXX XXXX. Authentication and authorization XXX both XXXXX on identity. XXX user or XXX XXXXXXX has to XXXX XXX/XXX XXXXXXXXXXX for XXXXXXXX to XXX server or XXXXXXXX device requesting them XX XXXXXX of the network. XXXX XXXXX have a XXXXXXXX and XXXXXXXX XXXXX XXXX XXXXXXXX have a XXXXXX XXXXXXX address (XXX for example). XXXXX credentials will show XX the XXXX/machine XXX XXXXXX the network XXX the XXXX he/it XXX XXXXXXXX with. However, XXXXX XXXXXXXX means do not always XXXX together. X public wireless network can XXXXX XXXXX XX XXXXXXX without authentication but the same XXXXXXX will XXXX XXXXX several designated XXXXX XX make XXXXXXX XX the XXXXXXX. XXX example, XXX user XXX the XXXXXXXXXXXXX will log on XXX XXXXXXX without XXX XXXXXXXX but the XXXXXXXXXXXXX can XXXXX the control XXXXX XX XXX network.Therefore, authentication XXX authorization XXX XX XXXXXXXX or co-XXXXXXXXX. XXXXXXX, authorization depends XX authentication. XXXXXXX revealing XXX XXXXXXXX XX XXX XXXX or XXX machine, the network cannot XXXX what XXX XXXX on the XXXXXXX or it XXXX XXXXXX a limited XXX. On the XXXXX XXXX, XXXXXXXXXXXXXX XXXX not XXXXXX XX the authorization process. Servers XXX reject the XXXXX not allowed to access the XXXXXXX. XX XXXXXXXX, the XXXX XXXX perceive XXX XXXXXXXXXXXXXX process XX XXXXXXXXXX XXXX XXX authorization one but on the XXXXXXXXX side, these processes will take XXXXX XXXXXXXXXX (XXXXXX, 2012). XX authenticating, the XXXXXX XXXX XXXXXXX XXXX the role XXXX XXXX XXX on XXX XXXXXXX XXX what it XXX XX or XXX.
References
XXXX, V. (XXXX),What Is The Difference Between XXXXXXXXXXXXXX XXX XXXXXXXXXXXXX?, XXXXXXXX, XXXXXXXXX on March 13, XXXX, XXXXXXXXX from XXXXXXXXX.XXX/XXX/XXXXXXXXXXXXXX-vs-authorization/
Mayhew, A. (XXXX),Authorization vs. Authentication – XXXX’s XXX Difference? , LicensingLive, October XX, 2012, retrieved XXXX licensinglive.XXX/blog/2012/10/XXXXXXXXXXXXX-vs-authentication-whats-the-difference/
">