Page 223 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 223

Unit 13: Wireless Networks Security




          9.   A ................................... is a type of web attack that seeks to disrupt the normal function of   Notes
               the targeted computer network.
          10.   Wired  Equivalent  Privacy  (WEP)  is  a  security  algorithm  for  ...................................
               wireless networks.
          11.   Twenty-six digits of four bits each gives 104 bits; adding the 24-bit IV produces the complete
               ................................... WEP key.
          12.   ................................... allow employees to securely access their company's intranet  while
               traveling outside the office.

              

             Case Study  Wireless Network Security

                     ith the explosion in “WiFi” wireless networks, a new and very real threat to
                     companies  has emerged, against which most are as yet unprotected. Many
             Worganisations are introducing this new and very useful technology to their
             networks without fully understanding the security implications.

             What are the dangers?
             Recent intruder activities such  as  “warchalking” and “wardriving” have captured the
             media’s attention and increased awareness of wireless network security risks. These risks
             are basically:
             1.   Unauthorised use of your internet connection
                   Alongside the enormous growth in WiFi, there is a broadband revolution going on.
                 This means that fast internet connections could be used by intruders, causing excess
                 traffic and overloading of your service.
             2.   Unauthorised access to your internal servers and confidential data
                   Given enough time, an intruder could work out your computer passwords and gain
                 access to your data.
             3.   An intruder reading the network traffic as it flows across the network
             By  using  a  WiFi  listening  tool,  an  intruder  can  listen  in  on  network  traffic.  When  a
             document is viewed from across the network, the intruder can see that information. This
             requires sophisticated software and some expertise on the part of the intruder, but is still
             a real danger.
             Making your wireless network more secure
             The designers of WiFi  have incorporated measures to prevent  intruders from gaining
             access to your wireless network. Depending on your specific requirements, you can use
             some or all of them. The main measures are as follows:
             1.   Introducing access lists
                   Each WiFi card has a unique identification number. Most WiFi networks have a list
                 of allowed cards. Adding only your cards will stop an intruder’s card from accessing
                 your WiFi network.

             2.   Using encryption
                   A basic encryption is available in WiFi. Using this will stop an intruder from
                 accessing your wireless network in the short term. It will also stop a casual intruder
                 from seeing data on your network.
                                                                                 Contd...


                                           LOVELY PROFESSIONAL UNIVERSITY                                   217
   218   219   220   221   222   223   224   225   226   227   228