By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan, vvajratiya@gmail.com
Modern connectivity relies heavily on wireless communication since it allows data and information to be sent without the use of physical cords. Wireless networks are widely used, however this also presents cybersecurity issues because these systems are vulnerable to several types of attacks. The following are important cyber security factors to consider when using wireless communication.
1. Encryption
To protect data transferred via wireless networks, strong encryption algorithms must be implemented. This protects critical information’s confidentiality and stops unwanted access.
2. Authentication
Robust authentication processes, such two-factor authentication, aid in confirming the legitimacy of people and devices connecting to wireless networks. By doing this, the chance of unwanted access and use is reduced.
3. Access Control
Robust access control guidelines guarantee that the wireless network can only be accessed by authorised users and devices. This reduces potential entry points for cybercriminals and aids in the prevention of unwanted access.
4. Firewalls and Intrusion Detection Systems
By monitoring and filtering network traffic, the deployment of firewalls and intrusion detection systems adds an extra layer of defence. In the wireless network, this aids in the detection and prevention of malicious activity.
5. Securing Endpoints
Internet of Things and smartphone devices that are linked to wireless networks need to be sufficiently secured. This entails putting security mechanisms into place, creating secure passwords, and updating the software on your devices.
6. Wireless Network Segmentation
The effects of a security breach can be minimised by dividing wireless networks into distinct zones with varying degrees of protection. Attackers’ potential for lateral mobility is restricted if just one segment is disrupted.
7.Monitoring and Logging
By keeping thorough logs and continuously monitoring wireless network activity, abnormalities can be found and important information can be found for analysing security occurrences.
References
- Deveci, M., Pamucar, D., Gokasar, I., Köppen, M., Gupta, B. B., & Daim, T. (2023). Evaluation of Metaverse traffic safety implementations using fuzzy Einstein based logarithmic methodology of additive weights and TOPSIS method. Technological Forecasting and Social Change, 194, 122681.
- Chaklader, B., Gupta, B. B., & Panigrahi, P. K. (2023). Analyzing the progress of FINTECH-companies and their integration with new technologies for innovation and entrepreneurship. Journal of Business Research, 161, 113847.
- Casillo, M., Colace, F., Gupta, B. B., Lorusso, A., Marongiu, F., & Santaniello, D. (2022, June). A deep learning approach to protecting cultural heritage buildings through IoT-based systems. In 2022 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 252-256). IEEE.
- Jiao, R., Li, C., Xun, G., Zhang, T., Gupta, B. B., & Yan, G. (2023). A Context-aware Multi-event Identification Method for Non-intrusive Load Monitoring. IEEE Transactions on Consumer Electronics.
- Wang, L., Han, C., Zheng, Y., Peng, X., Yang, M., & Gupta, B. (2023). Search for exploratory and exploitative service innovation in manufacturing firms: The role of ties with service intermediaries. Journal of Innovation & Knowledge, 8(1), 100288.
Cite As:
Vajrobol V. (2024) Wireless communication and cyber securityre domain, Insights2Techinfo, pp.1