2. What Is Wireless?
• Wireless communication, or sometimes simply wireless, is the transfer of
information or power between two or more points or computers that are
not connected by an electrical wires.
• Wireless technology has made dramatic changes in the way computer
users communicate worldwide. Billions of home and business users have
notebook computers, smart phones, and other mobile devices to access the
Internet, send e-mail and instant messages, chat online, or share network
connections all without wires.
3. Continue…
• Although wireless access provides many conveniences to users, it also
poses additional security risks. About 80 percent of wireless networks
have no security protection.
• To access the network, the individual must be in range of the wireless
network. Some intruders intercept and monitor communications as they
transmit through the air. Others connect to a network through an
unsecured wireless access point (WAP). In one technique, called “war
driving or access point mapping”, individuals attempt to detect wireless
networks
4. Continue…
via their notebook computer or mobile device while driving a vehicle
through areas they suspect have a wireless network.
• Some individuals instead use “war flying”, where they use airplanes
instead of vehicles to detect unsecured wireless networks.
5. Wireless Security
What is wireless Security?
• It is the prevention of unauthorized access to computer using wireless
networks.
• In addition to using firewalls, some safeguards that improve the security
of wireless networks include reconfiguring the wireless access point and
ensuring equipment uses one or more wireless security standards such as
Wi-Fi Protected Access and 802.11i.
6. Types Of Wireless Security
• WAP (wireless access point):
A wireless access point (WAP) should be configured so that it does not broadcast a
network name, known as an SSID (service set identifier). Users should change the
default SSID to prevent unauthorized users from accessing their wireless network.
The WAP also can be programmed so that only certain devices can access it.
• WEP (Wireless Equivalent Privacy)
It is one of the least secure form of security. It was developed for wireless networks
and approved as a Wi-Fi security standard in September 1999. However there are
bunch of security issues in WEP which also easy to break and hard to configure.
7. Continue…
• WPA (Wi-Fi protected access):
Wi-Fi Protected Access (WPA) is a security standard that improves on older
security standards by authenticating network users and providing more
advanced encryption techniques.
• WPA2:
It is also knows as 802.11i network, sometimes, the most recent network
security standard, conforms to the government’s security standards and uses
more sophisticated encryption techniques than WPA.
8. Tips for Wireless Network Security
• Change default Administrator Password:
The password provided are simple and very well known to hackers on
Internet.
• Turn on Encryption:
Encryption technology scrambles messages sent over wireless network , so
they cannot easily read by humans.
• Change the default SSID:
Change your network’s SSID to something unique.
9. Continue…
• Enable MAC Address Filtering:
With MAC address filtering, you specify which computers can access your
network.
• Position the router or access point safely:
Wi-Fi signals leakage - easier for others to detect
and exploit.
Try to position the access point or router near the center of the home rather
than near windows - minimize leakage.
10. Continue…
• Turn of the network during extended period of Non-Use:
If you own a wireless router but are only using it wired (Ethernet)
connections, you can turn off Wi-Fi on a broadband router without powering
down the entire network.
• Stop Auto-Connecting to Open Wi-Fi Networks:
Connecting to an open Wi-Fi network such as a free wireless hotspot or your
neighbor’s router exposes your computer to security Risks.
• Enable firewall on each computer and the router.