This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Cyber-crime in Context of Theft of Data

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF

Theft of data is one of the biggest issues which have become nightmare in context of wireless networking. WEP is considered as the very weak security and it is claimed that its password could be cracked within few minutes flowing very simple and easy producers. WPA is the upgraded security system which provides secure wireless networking with reduced threat of theft of data. The latest standard of wireless network’s security is WPA2. WPA2 needs an upgrade of devices as it is not compatibles with all devices.

Works in the fields of establishing secured wireless networks

For hackers it is comparatively very easy to hack wireless network than to hack conventional wired networks. So active defense against such hacking attacks is required in order to make devices more secure. Anyone in the range of un-encrypted open network could access the data available on the network and could interfere with it. Even the weak security system provides loop holes to the hackers for having unauthorized access of the information present on network. Several security systems have been established in order to make the wireless networking secure these include WEP, WPA and WPA2.

These security systems help network from the war driving attacks and jamming attacks and other cyber-attacks related to the networking.

What is war driving and how to cope up with that?

In 1980’s there was a very popular term in the west which was known as war-dialing; this term was referred to the phone hacking. With the advent of wireless networking systems concept of War-driving was tossed. In year 2001 this tool of War Driving became very popular. War Driving could be used as hobby for simply mapping the wireless networks across the route and could also be used by hackers who after tracking these networks try to invade into it by using different tools which are now widely available online for free.

In war driving a hacker travels in his automobile with portable laptop device for scanning different networks available on that route. The threat of War Driving increased with the increased strength of wireless network signals; now-a- day Wi-Fi signals at different offices could be strong enough to serve the larger radius which may even be extended outside the parking area of the building. People travelling on road could also find these signals of Wi-Fi and hackers and cyber attackers could use these to intervene in the confidential company data.

War chalking is also related to the war driving. Sometimes these war driving hobbyists after tracking down the information of the network write it on the nearby by walls for informing other war drivers. War driving and War chalking could only be prevented by introducing proper wireless security system using encryption methods and neural networking.

Jamming attacks are also a type of interference which impairs the efficiency of wireless networking. In this this type of cyber-attack strong and powerful signals are transmitted by hackers which interfere with the signals of the wireless network and cause it a face a jam.

Encryption of wireless network

Messages being hacked in transit are one of the major issues which make the all existing security systems fail. Encryption is the only reliable method used in the entire world for the purpose of data security while in transit. Encrypted messages could only be accessed by the authorized person and unauthorized persons could not access the encrypted data. It could be said as the one of the strongest security setups used against the threats of war driving and jamming etc. WEP, WPA and WPA2 are the network security tools which are based on encryption. Here encryption key is mandatory for entering the network. Encryption key is known by the router and any device sending the wrong encryption key is denied by the router. It is claimed that encrypted networks provides security as same as the cable networking systems.

One or more encryption algorithms are implemented on OSI layer of networking in order to achieve network security.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Cyber-Crime In Context Of Theft Of Data. (2019, July 10). GradesFixer. Retrieved December 4, 2021, from
“Cyber-Crime In Context Of Theft Of Data.” GradesFixer, 10 Jul. 2019,
Cyber-Crime In Context Of Theft Of Data. [online]. Available at: <> [Accessed 4 Dec. 2021].
Cyber-Crime In Context Of Theft Of Data [Internet]. GradesFixer. 2019 Jul 10 [cited 2021 Dec 4]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery