Shared Wireless Wireless-Fidelity Wi-Fi Network Term Paper

Those against piggybacking say this practice does have a cost for those paying for wireless services because their broadband connections are slowed down by additional piggybacker traffic, sometimes so much so that the access becomes unusable. Others argue that taking or borrowing without permission is unethical and that lack of security to not justify unauthorized access. Anti-piggybackers want laws to be introduced to prevent piggybacking just like unauthorized access to other types of property (Ethical dilemmas of unsecured wireless networks).

Some local governments agree with sentiments against piggybacking and are enacting laws to stop it. For instance, the local government in Westchester County, N.Y. enacted a county-wide law requiring all commercial businesses to secure their wireless LAN access and to post signs on the wall to advise the user to "install a firewall or other computer security measure" (Local govts. target Wi-Fi piggybacking, 2007). The state of New York is considering similar legislation. Recently, California passed the "Wi-Fi User Protection Bill," which requires manufacturers to provide security warnings and advice in the products they sell. California's AB215 forces wireless LAN vendors to either put a security warning sticker on the wireless router that presents an installation message advising that it's time to secure the network, or to secure the wireless LAN through a service. Some believe that California's new legislation will impact the entire country because manufacturers are likely to change all of their equipment, not just...

...

target Wi-Fi piggybacking, 2007).
As we have seen, other than weak efforts by local government in California and New York, laws against shared access don't exist. It seems ridiculous to try to use our overcrowded judicial system to deal with this issue even if more strict laws were developed. Technology created the shared access and, ultimately, technology will have to be the vehicle by which access is restricted to authorized users. As long as doors are left open, people will enter.

Bibliography

Ethical dilemmas of unsecured networks. http://72.14.253.104/search?q=cache:4n6xx5jhPTwJ:www.csd.abdn.ac.uk/~fguerin/teaching/CS5038/assessment/essays_from_2006/groupK/WiFi%2520Essay.doc+%22open+networks%22+ethics&hl=en&gl=us&ct=clnk&cd=24

Issues with wireless networking at CWRU. (2001, February 14). http://tiswww.case.edu/net/engr/wireless/issues.html

Local govts. target Wi-Fi piggybacking (2007, January 9). ZDNet Government. http://government.zdnet.com/?p=2828

Marriott, M. (2006, March 5). Hey neighbor, stop piggybacking on my wireless. The New York Times. http://www.nytimes.com/2006/03/05/technology/05wireless.html?pagewanted=1&ei=5089&en=de3c127408552e0a&ex=1299214800

Savvas, a. (2006, July 10). It firms admit struggle to secure wireless Lans. ComputerWeekly.com. http://www.computerweekly.com/Articles/2006/07/10/216815/it-firms-admit-struggle-to-secure-wireless-lans.htm

WiFi. http://www.answers.com/topic/wifi

Sources Used in Documents:

Bibliography

Ethical dilemmas of unsecured networks. http://72.14.253.104/search?q=cache:4n6xx5jhPTwJ:www.csd.abdn.ac.uk/~fguerin/teaching/CS5038/assessment/essays_from_2006/groupK/WiFi%2520Essay.doc+%22open+networks%22+ethics&hl=en&gl=us&ct=clnk&cd=24

Issues with wireless networking at CWRU. (2001, February 14). http://tiswww.case.edu/net/engr/wireless/issues.html

Local govts. target Wi-Fi piggybacking (2007, January 9). ZDNet Government. http://government.zdnet.com/?p=2828

Marriott, M. (2006, March 5). Hey neighbor, stop piggybacking on my wireless. The New York Times. http://www.nytimes.com/2006/03/05/technology/05wireless.html?pagewanted=1&ei=5089&en=de3c127408552e0a&ex=1299214800
Savvas, a. (2006, July 10). It firms admit struggle to secure wireless Lans. ComputerWeekly.com. http://www.computerweekly.com/Articles/2006/07/10/216815/it-firms-admit-struggle-to-secure-wireless-lans.htm
WiFi. http://www.answers.com/topic/wifi


Cite this Document:

"Shared Wireless Wireless-Fidelity Wi-Fi Network" (2007, January 27) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/shared-wireless-wireless-fidelity-wi-fi-40390

"Shared Wireless Wireless-Fidelity Wi-Fi Network" 27 January 2007. Web.20 April. 2024. <
https://www.paperdue.com/essay/shared-wireless-wireless-fidelity-wi-fi-40390>

"Shared Wireless Wireless-Fidelity Wi-Fi Network", 27 January 2007, Accessed.20 April. 2024,
https://www.paperdue.com/essay/shared-wireless-wireless-fidelity-wi-fi-40390

Related Documents

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Wireless Broadband Technology
PAGES 50 WORDS 20344

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Free Wireless Networks
PAGES 20 WORDS 5062

Free Wireless Networks Since the construction of the information Superhighway, its' use to distribute information has become phenomenal. Information gathering and dissemination is the most valuable asset for a business to succeed. Demands for more and more efficient means of connecting to the Internet have driven exponential technological advances. So much so that the craze to connect has gone wireless and with this technology an entirely new set of issues, concerns

Security Issues in IEEE Wlan
PAGES 20 WORDS 6613

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby

Hspa and Evolved Hspa With
PAGES 11 WORDS 2969

HSPA+ is expected to be commercially available in 2008 through [the introduction] of incremental investments and backward and forward compatible handsets. HSPA+ doubles the data capacity and increases voice capacity by three times enabling operators to offer mobile broadband at even lower cost" (Release 7 HSPA+, 2007, p. 3). Likewise, Housami (2008) reports that, "HSPA+ is a manifestation of the evolved HSPA philosophy where the existing HSPA implementation is