2. Scott Kreuser
Wireless networks operate with radio wave frequencies, which travel
in a variety of different directions and can often be detected
successfully through building walls. As these frequencies cannot be
easily contained, security breaches such as wardriving can be
problematic for businesses and individuals.
3. Scott Kreuser
Wardriving is the name given to the act of travelling with a wireless-
enabled device, and seeking to join or listen in on networks wherever
possible. Software has even been developed to speed up the process
of wardriving, and the presence of websites and the marking of
buildings allow for unprotected networks to be discovered with
relative ease. The security risks that come to light with wardriving
include data interception, cracking, transmission jamming, and
attacks with the purpose of denial of service. Data interception is
particularly risky, as the process may be used to access private and
confidential information and Internet activity, which is potentially
hazardous for businesses of all sizes. Outside parties may use
unsecured networks to perform attacks, to spam, or to download
illegal content such as certain types of pornography, or music and
video content that breaches copyright regulations.
4. Scott Kreuser
About the Author: Wireless network engineer and security specialist,
Scott Kreuser is responsible for the deployment and maintenance of
the Silver Spring network for Florida Power and Light. Scott Kreuser
draws on 23 years of highly specialized network engineering
experience to deliver system and business analysis, project
management, and international relations services to clients.