Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

This discussion question concerns security flaws in WEP, WPA, WPA2, RFID or othe

ID: 3883301 • Letter: T

Question

This discussion question concerns security flaws in WEP, WPA, WPA2, RFID or other Internet of Things (IoT) protocols or products. requirement ·         Summarise two or three types of attacks associated with WEP, WPA, WPA2, RFID or other Internet of Things (IoT) protocols or products. ·         List several scenarios to support your viewpoint that these attacks are realistic (if possible, use personal examples) and propose a solution to detect and prevent these attacks. This discussion question concerns security flaws in WEP, WPA, WPA2, RFID or other Internet of Things (IoT) protocols or products. requirement ·         Summarise two or three types of attacks associated with WEP, WPA, WPA2, RFID or other Internet of Things (IoT) protocols or products. ·         List several scenarios to support your viewpoint that these attacks are realistic (if possible, use personal examples) and propose a solution to detect and prevent these attacks. This discussion question concerns security flaws in WEP, WPA, WPA2, RFID or other Internet of Things (IoT) protocols or products. requirement ·         Summarise two or three types of attacks associated with WEP, WPA, WPA2, RFID or other Internet of Things (IoT) protocols or products. ·         List several scenarios to support your viewpoint that these attacks are realistic (if possible, use personal examples) and propose a solution to detect and prevent these attacks.

Explanation / Answer

everything connected to the internet is trackable and hackable so the people must be sured that they are not track in any situations where the connection in device are normal secure but in order to gain access some people will try to install or exploit a weak point in the connection so that it can be trackable.

WEP uses RC4 encryption these encryption are stream of cipher their where two attacks would some how gain access to the system .

these attacks could be prevented by monitoring the system regularly and some intrustion detection system must be deployed in the system for safe keeping of the data.

Beck-tews attack

the hacker can listen to both the client and the sender where the ony the last part of the information is got and with that information the hacker can inject more data that will be accepted by the client.where the key and the steam of data is got and sniffed by the hacker .

Ohigashi-Morii attack this is the advancement of the Beck-tews attack

so these attacks are used to gain the access in the network with part of the data they can decrypt these data will hold the key to give the infromation to the hacker.

for example IOT device likes or embed hardware are so vulnerableto the hackers there is no security measure for the pace maker that is embed to the human boady if some one is skillful enough to gain these access this will lead to huge disaster.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote