Safety of Public WIFI

My topic is cybersecurity, focusing on the safety of public wifi and wireless networks. It is important to me to find different types of attacks and ways to help prevent them. I’m hoping this topic will be enough or not too much to write about. I do not feel I have reached saturation because I still have many questions that still need to be answered about my topic that need more research.

Finish Secondary Research

First Search

  • Database: Computer Science Collection
    • Search: Public WIFI
      • Limiters: Full text, Peer-Reviewed
      • Results: 18

Rader, E., & Wash, R. (2015). Identifying patterns in informal sources of security information. Journal of Cybersecurity. https://doi.org/10.1093/cybsec/tyv008

Annotated Bibliography #1

The research done in this article finds sources of informal security education to create patterns in user knowledge that will make users of public Wi-Fi make informed decisions. Identifying patterns in informal sources of security information journal article talks about important security decisions using public Wi-Fi. Some informal training could help users become more knowledgeable on computer security information. Using a topic model, they found that most peers focus on who conducts attacks, information containing expertise focuses instead on how attacks are conducted, and information from the news focuses on the consequences of attacks.  I think this search could be helpful when I get my topic narrowed down better. Learning to find relevant articles in the FHSU Databases is a challenge because the articles are usually long and written by advanced researchers.

Second Search

  • Database: Computer Science Collection
    • Search: Free Public WIFI
      • Limiters: Full text, Peer-Reviewed
      • Results: 2

Noor, M. M., & Hassan, W. H. (2013). Wireless networks: developments, threats, and countermeasures. International Journal of Digital Information and Wireless Communications, 3(1), 119+. https://go.gale.com/ps/i.do?id=GALE%7CA353693482&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=2225658X&p=AONE&sw=w&userGroupName=anon%7E1a930429

Annotated Bibliography #2

Active research and threats to wireless networks are developing and introducing end-users with more security tools is making people more aware. Wireless networks: developments, threats, and countermeasures article inform users of current threats to Wi-Fi. The article discusses threats such as Man in the Middle Attack (MITM), Rogue Access Points (RAP), Denial of Services (DoS), and social engineering attacks. Studies showed that wireless networks are prone to many threats and attacks. Public hotspots are exposed and users do not realize their data has been compromised due to the submissive nature of the attacks. As long as I stay with the topic of the dangers while using public Wi-Fi this article will be very relevant to my research.

Third Search

  • Database: Computer Science Collection
    • Search: Dangers of Public WIFI
      • Limiters: Full text
      • Results: 1

NETGEAR Debuts the Unlocked Version of Nighthawk Router. (2021, October 1). Connectivity News, 33(10), NA. https://www.netgear.com/home/mobile-wifi/hotspots/mr5200/

Annotated Bibliography #3

The Nighthawk M5 takes measures to avoid the dangers of using public Wi-fi and protect the public using a wireless network. This article is more of a guide to connectivity with the Nighthawk and their advancements in their newest mobile routers. This device is equipped with VPN pass-through support and password protection. This article is somewhat helpful by offering information on having your own mobile hotspot. The relevancy would be that it gives another option to connect to the internet that is not public when you are not at home or in an office.

Fourth Search

  • Database: Computer Source
    • Search Public WIFI
      • Limiters: Full text
      • Results: 9

Preimesberger, C. (2013). Public WIFI Security: 10 Things to Remember Before Signing On. EWeek, 1. https://www.eweek.com/security/behave-like-you-re-in-public/

Annotated Bibliography #4

There are 10 things to remember that will help reduce security risks and public Wi-Fi connections are one of the most vulnerable locations to attack. Behave like you’re in public, use updated antivirus and firewall software, beware of hotspots, use a virtual private network, use an encrypted web page, don’t interconnect by accident, don’t turn off your antivirus for a faster connection, turn off the computer if you start getting warnings about website connections, and run malware after using a public Wi-Fi. This article is relevant to my topic and appears to be generally relevant. There are good reminders in this article to keep a secure connection and avoid risks. Additional searches will help get more details on securing your network and computer.

Fifth Search

  • Database: Computer Source
    • Search VPN
      • Limiters: Full text, peer-reviewed
      • Results: 13

Tight bounds for online vector bin packing – bshepherd.ca. (n.d.). Retrieved April 22, 2022, from https://bshepherd.ca/img/papers/stoc1.pdf

Annotated Bibliography #5

The VPN conjecture is proving that the tree demand problem is solved in the form of hierarchical hubbing. This article is about finding the best and cheapest way to resolve the tree demand problem. The statistics and algorithms in this article are difficult to understand. I find this article not relevant to my research or helpful. The article is too advanced for my level of knowledge in this field and therefore easily misunderstood. More research is needed to value a VPN for public Wi-Fi safety. I have not reached saturation.

 

 

OpenClipart-Vectors / Pixabay

 

About Heath

This is my second semester attending FHSU online classes. I am a Junior at FHSU and hope to get my Degree in Cyber Security. I enjoy playing video games with friends on Xbox One, fixing and building things, and hanging out with my cat, Thunder.

Leave a Reply

Your email address will not be published. Required fields are marked *