Topics . Home
. Networking History
. Why network?
. OSI model
. Connecting up
. Protocols
. Technology
. Network types
. Topologies
. Issues
. Design factors
. Economic effects
. www links
. Site map
|
With the advent of wireless networking, organisations are becoming very concerned with the use of their network by unauthorised persons. All a knowledgeable hacker needs is a computer with wireless capability and an antenna. By roaming the streets in a city, letting the antenna "sniff" out wireless data packets (sometimes called "war chalking") it would not take long to identify a network utilising wireless technology.
By scanning for wireless access points, a hacker can then use the wireless network to access the Internet using the organisations facility, or even eavesdrop on unprotected network communications. Other consequences of this action are to clog up the network bandwidth with unwanted traffic.
|
worksheets 
. history
. why network
. osi model
. connecting
. protocols
. technology
. topologies (tla)
. issues
. network types
. design
. economics
. economics (cs)
- solutions -
quizzes . why network
. osi model
. connecting
. protocols
. technology
. topology
. issues
. network types
. design
. economics
|