Page 224 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 224

Wireless Networks




                    Notes            3.   Hiding your network
                                            Most access points broadcast their WiFi name. This name is used to access a wireless
                                          network. Turning this feature off stops the WiFi network from drawing attention to itself.
                                          There are some further precautions you might consider taking, such as:
                                     4.   Monitoring WiFi traffic

                                            Software is now available to allow a WiFi network owner to monitor cards that have
                                          access to the network. This can alert the network owner if an intruder gains access.
                                     5.   Implementing secure VPN for wireless users

                                     For near impenetrability, a WiFi owner can introduce another level of security between
                                     the wireless network and the standard wired network. This is a costly exercise really only
                                     implemented on networks that contain particularly confidential and sensitive data.
                                     Risks versus benefits of wireless
                                     Wireless is a very flexible, cheap, highly useful and desirable new technology. There are
                                     very good reasons to implement it on your network. However, because it can offer intruders
                                     an entry point, you need to understand and guard against the dangers. Bridge Partners can
                                     help you weigh the benefits of wireless against the risks, and to manage these risks in line
                                     with your own security needs. By implementing some of the measures described here, you
                                     can greatly reduce the risk of a security breach and still enjoy the many benefits of WiFi.

                                     Questions:
                                     1.   Study and analyse the case.
                                     2.   Write down the case facts.
                                     3.   What do you infer from it?

                                   Source: http://www.bridgepartners.co.uk/wireless-network-security

                                   13.8 Summary

                                   Wireless  security  is the prevention of unauthorized access or damage  to computers
                                   using  wireless  networks.  The  most  common  types  of  wireless  security  are  Wired  Equivalent
                                   Privacy (WEP) and Wi-Fi Protected Access (WPA).
                                   The risks to users of wireless technology have increased as the service has become more popular.
                                   Wireless networking  is inherently  risky  because you are transmitting  information via radio
                                   waves. Data from your wireless network can be intercepted just like signals from your cellular
                                   or cordless phones.

                                   The modes of unauthorised access to links, to functions and to data is as variable as the respective
                                   entities make use of program code.
                                   Non-traditional networks such as personal network Bluetooth devices are not safe from cracking
                                   and should be regarded as a security risk.
                                   Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access Control
                                   (MAC) address is changed by the attacker.  Also, called an ARP spoofing attacks, it is effective
                                   against both wired and wireless local networks.
                                   Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11wireless networks.








          218                              LOVELY PROFESSIONAL UNIVERSITY
   219   220   221   222   223   224   225   226   227   228   229