Page 223 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 223
Unit 13: Wireless Networks Security
9. A ................................... is a type of web attack that seeks to disrupt the normal function of Notes
the targeted computer network.
10. Wired Equivalent Privacy (WEP) is a security algorithm for ...................................
wireless networks.
11. Twenty-six digits of four bits each gives 104 bits; adding the 24-bit IV produces the complete
................................... WEP key.
12. ................................... allow employees to securely access their company's intranet while
traveling outside the office.
Case Study Wireless Network Security
ith the explosion in “WiFi” wireless networks, a new and very real threat to
companies has emerged, against which most are as yet unprotected. Many
Worganisations are introducing this new and very useful technology to their
networks without fully understanding the security implications.
What are the dangers?
Recent intruder activities such as “warchalking” and “wardriving” have captured the
media’s attention and increased awareness of wireless network security risks. These risks
are basically:
1. Unauthorised use of your internet connection
Alongside the enormous growth in WiFi, there is a broadband revolution going on.
This means that fast internet connections could be used by intruders, causing excess
traffic and overloading of your service.
2. Unauthorised access to your internal servers and confidential data
Given enough time, an intruder could work out your computer passwords and gain
access to your data.
3. An intruder reading the network traffic as it flows across the network
By using a WiFi listening tool, an intruder can listen in on network traffic. When a
document is viewed from across the network, the intruder can see that information. This
requires sophisticated software and some expertise on the part of the intruder, but is still
a real danger.
Making your wireless network more secure
The designers of WiFi have incorporated measures to prevent intruders from gaining
access to your wireless network. Depending on your specific requirements, you can use
some or all of them. The main measures are as follows:
1. Introducing access lists
Each WiFi card has a unique identification number. Most WiFi networks have a list
of allowed cards. Adding only your cards will stop an intruder’s card from accessing
your WiFi network.
2. Using encryption
A basic encryption is available in WiFi. Using this will stop an intruder from
accessing your wireless network in the short term. It will also stop a casual intruder
from seeing data on your network.
Contd...
LOVELY PROFESSIONAL UNIVERSITY 217