Institutional Repository
dc.contributor.author | Mlelwa, Kenneth | |
dc.date.accessioned | 2023-08-09T16:09:12Z | |
dc.date.available | 2023-08-09T16:09:12Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Mlelwa, K. L. (2023). Investigate trojans, wireless concepts and their attacks. In Losioki, B. E. et al (Eds). Proceedings of the 1st Academic Conference in Commemoration of the Late Mwalimu Julius Kambarage Nyerere, the First President of the United Republic of Tanzania and Father of the Nation, on the theme of "The Legacy of Mwalimu Nyerere in Improving Human Welfare and Socio-economic Development". Dar es salaam. 2022, Octoberr 11th to 12th. | en_US |
dc.identifier.isbn | 978-9912-41-308-5 | |
dc.identifier.uri | http://41.59.91.195:9090/handle/123456789/169 | |
dc.description | Conference Proceedings | en_US |
dc.description.abstract | The World is becoming increasingly more mobile over the past few years. The conventional methods of networking, which rely on physical cables, have proved insufficient to address the challenges posed by our current collective lifestyle. As individuals and businesses require constant connectivity and the ability to move freely, wireless networking has emerged as a crucial solution. Wireless networks use technologies such as 802.11 (Wi-Fi) to provide internet access without the constraints of physical cables. Devices can remain connected to the network while roaming, allowing for greater mobility. Access points are used to enhance Wi-Fi signals, ensuring that devices can connect to the network even when they are far from the router. This has made wireless networks immensely popular in various settings, including public places like restaurants and cafes. However, wireless networks are not without their security challenges. They are vulnerable to both passive and active attacks. A passive attack involves an attacker capturing the wireless signal without sending any signals themselves. These attacks can be easily carried out using wireless antennas and are often undetectable. It is important to assume that attackers can see everything on a wireless network as part of a comprehensive security procedure. To secure a wireless network, administrators need to be aware of the vulnerabilities that exist and the types of attacks that can exploit them. Malicious software, or malware, poses a significant threat to wireless LANs as they have become more common. These programs can disguise themselves as legitimate code or programs and once inside the network, attackers can perform a range of unauthorized actions such as transferring files, modifying data, or deleting files. Another security concern is the presence of backdoors, which refer to methods that allow authorized and unauthorized users to bypass normal security measures and gain high-level access to a computer system, network, or software application. These backdoors can be exploited by attackers to gain unauthorized access to sensitive information or control over the network. A denial-of-service (DoS) attack is a common threat to wireless networks as well. It involves disrupting the efficient use of network resources and essential services, rendering the network unavailable to legitimate users. This can disrupt operations and cause significant inconvenience or financial loss. Session hijacking attacks occur when an attacker takes over a user's wireless session. This can happen while the user is performing activities such as checking their credit card balance, paying bills, or shopping online. The hijacker typically targets the user's browser or web application programs, allowing them to gain unauthorized access to sensitive information or perform fraudulent actions. Thereof, while wireless networks provide immense convenience and mobility, they also present security risks. It is crucial for network administrators to be aware of these vulnerabilities and implement appropriate security measures to protect against passive and active attacks, malware, backdoors, DoS attacks, and session hijacking. This will help ensure the integrity and privacy of the network and its users. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | The Mwalimu Nyerere Memorial Academy | en_US |
dc.subject | Networking | en_US |
dc.subject | Network attacks | en_US |
dc.subject | Network administrations | en_US |
dc.subject | Internet security | en_US |
dc.title | Investigate trojans, wireless concepts and their attacks | en_US |
dc.type | Conferencce Proceedings | en_US |