Page 224 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 224
Wireless Networks
Notes 3. Hiding your network
Most access points broadcast their WiFi name. This name is used to access a wireless
network. Turning this feature off stops the WiFi network from drawing attention to itself.
There are some further precautions you might consider taking, such as:
4. Monitoring WiFi traffic
Software is now available to allow a WiFi network owner to monitor cards that have
access to the network. This can alert the network owner if an intruder gains access.
5. Implementing secure VPN for wireless users
For near impenetrability, a WiFi owner can introduce another level of security between
the wireless network and the standard wired network. This is a costly exercise really only
implemented on networks that contain particularly confidential and sensitive data.
Risks versus benefits of wireless
Wireless is a very flexible, cheap, highly useful and desirable new technology. There are
very good reasons to implement it on your network. However, because it can offer intruders
an entry point, you need to understand and guard against the dangers. Bridge Partners can
help you weigh the benefits of wireless against the risks, and to manage these risks in line
with your own security needs. By implementing some of the measures described here, you
can greatly reduce the risk of a security breach and still enjoy the many benefits of WiFi.
Questions:
1. Study and analyse the case.
2. Write down the case facts.
3. What do you infer from it?
Source: http://www.bridgepartners.co.uk/wireless-network-security
13.8 Summary
Wireless security is the prevention of unauthorized access or damage to computers
using wireless networks. The most common types of wireless security are Wired Equivalent
Privacy (WEP) and Wi-Fi Protected Access (WPA).
The risks to users of wireless technology have increased as the service has become more popular.
Wireless networking is inherently risky because you are transmitting information via radio
waves. Data from your wireless network can be intercepted just like signals from your cellular
or cordless phones.
The modes of unauthorised access to links, to functions and to data is as variable as the respective
entities make use of program code.
Non-traditional networks such as personal network Bluetooth devices are not safe from cracking
and should be regarded as a security risk.
Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access Control
(MAC) address is changed by the attacker. Also, called an ARP spoofing attacks, it is effective
against both wired and wireless local networks.
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11wireless networks.
218 LOVELY PROFESSIONAL UNIVERSITY