WIRELESS NETWORKS: A Customer Loyalty Dream Can Become a Security Nightmare

Ilori, Tia D.
October 2010
Hospitality Upgrade;Fall2010, p124
Trade Publication
The article presents common methods used by data thieves to attack wireless networks. It states that data thieves can gain access to a wireless network only by listening to traffic. It says that data thieves can use vulnerability in the wireless network to obtain access to payment data elsewhere in the system. Denial-of-service attacks can be used by data thieves interrupt business operations.


Related Articles

  • On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. Savola, Reijo M.; Abie, Habtamu // Journal of Networks;Sep2009, Vol. 4 Issue 7, p565 

    We propose an integrated security measurement architecture and framework for a dynamic self-organizing monitoring system based on mobile ad hoc networks (MANETs), structured according to currently known security challenges. The aim is to predict, as well as to monitor, the security performance,...

  • A Survey on Wireless Sensor Network Security. Sen, Jaydip // International Journal of Communication Networks & Information Se;Jul2009, Vol. 1 Issue 2, p59 

    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can...

  • Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2. Mandhata, S. C.; Patro, S. N.; Mohanty, S. P. // International Journal of Computer Applications;May2012, Vol. 45, p6 

    In recent days Mobile Ad Hoc Network (MANet) has drawn the attention of many researchers largely owing to the inherent characteristics and varied applicability. Unlike traditional wired network, MANet has no clear line of defense. Moreover, the intrinsic properties of MANet expose many...

  • Securing Wireless Sensor Networks: Security Architectures. Boyle, David; Newe, Thomas // Journal of Networks;Jan2008, Vol. 3 Issue 1, p65 

    Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important...

  • WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX. Amirpoor, Reza; Kumar, Ajay; Deavne, Satish R. // International Journal of Network Security & Its Applications;Jul2010, Vol. 2 Issue 3, p158 

    Nowadays, use of wireless technology in organizations is a regular act, and we can see this technology erupted in all possible different areas. Related to employing wireless technology those organizations need to apply properly security level, depend on security policy which already defined. If...

  • Untitled. Ashford, Warwick // Computer Weekly;11/20/2007, p116 

    The article presents information on the survey related to wireless security, by Air Defense. It states that, by using insecure wireless network connections, retailers are exposing customers to theft of credit card information. The survey showed that 85% of wireless devices used by retailers,...

  • Cybersecurity: Are You safe? Wickman, Lindsay Edmonds // Certification Magazine;Jan2009, Vol. 11 Issue 1, p26 

    The article focuses on cybersecurity and the different cybercrimes now occurring in the U.S. Over 40 million credit and debit card numbers were stolen in 2005 from TJX stores due to insecure wireless networks and a total of 250,000 computers were infected in 2005 and 2006 with...

  • Evaluating MAPSec by marking attack graphs. Kotapati, Kameswari; Peng Liu; La Porta, Thomas F. // Wireless Networks (10220038);Nov2009, Vol. 15 Issue 8, p1042 

    MAPSec has recently been introduced as a security protocol for mobile telecommunication networks in the midst of numerous threats and vulnerabilities. Our initial study reveals that MAPSec can only provide protection coverage to a minor portion of the total network vulnerabilities. Motivated by...

  • Texas A&M probes traffic for assaults, faults. Cox, John // Network World;1/10/2005, Vol. 22 Issue 1, p17 

    This article reports that Texas A& M University has improved the network management and security for its sprawling wireless and wired campus network with an application that sifts through traffic for abnormalities or irregularities. By identifying patterns and dissecting them, the application,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics