Wireless Security
What Is Wireless?
• Wireless communication, or sometimes simply wireless, is the transfer of
information or power between two or more points or computers that are
not connected by an electrical wires.
• Wireless technology has made dramatic changes in the way computer
users communicate worldwide. Billions of home and business users have
notebook computers, smart phones, and other mobile devices to access the
Internet, send e-mail and instant messages, chat online, or share network
connections all without wires.
Continue…
• Although wireless access provides many conveniences to users, it also
poses additional security risks. About 80 percent of wireless networks
have no security protection.
• To access the network, the individual must be in range of the wireless
network. Some intruders intercept and monitor communications as they
transmit through the air. Others connect to a network through an
unsecured wireless access point (WAP). In one technique, called “war
driving or access point mapping”, individuals attempt to detect wireless
networks
Continue…
via their notebook computer or mobile device while driving a vehicle
through areas they suspect have a wireless network.
• Some individuals instead use “war flying”, where they use airplanes
instead of vehicles to detect unsecured wireless networks.
Wireless Security
What is wireless Security?
• It is the prevention of unauthorized access to computer using wireless
networks.
• In addition to using firewalls, some safeguards that improve the security
of wireless networks include reconfiguring the wireless access point and
ensuring equipment uses one or more wireless security standards such as
Wi-Fi Protected Access and 802.11i.
Types Of Wireless Security
• WAP (wireless access point):
A wireless access point (WAP) should be configured so that it does not broadcast a
network name, known as an SSID (service set identifier). Users should change the
default SSID to prevent unauthorized users from accessing their wireless network.
The WAP also can be programmed so that only certain devices can access it.
• WEP (Wireless Equivalent Privacy)
It is one of the least secure form of security. It was developed for wireless networks
and approved as a Wi-Fi security standard in September 1999. However there are
bunch of security issues in WEP which also easy to break and hard to configure.
Continue…
• WPA (Wi-Fi protected access):
Wi-Fi Protected Access (WPA) is a security standard that improves on older
security standards by authenticating network users and providing more
advanced encryption techniques.
• WPA2:
It is also knows as 802.11i network, sometimes, the most recent network
security standard, conforms to the government’s security standards and uses
more sophisticated encryption techniques than WPA.
Tips for Wireless Network Security
• Change default Administrator Password:
The password provided are simple and very well known to hackers on
Internet.
• Turn on Encryption:
Encryption technology scrambles messages sent over wireless network , so
they cannot easily read by humans.
• Change the default SSID:
Change your network’s SSID to something unique.
Continue…
• Enable MAC Address Filtering:
With MAC address filtering, you specify which computers can access your
network.
• Position the router or access point safely:
Wi-Fi signals leakage - easier for others to detect
and exploit.
Try to position the access point or router near the center of the home rather
than near windows - minimize leakage.
Continue…
• Turn of the network during extended period of Non-Use:
If you own a wireless router but are only using it wired (Ethernet)
connections, you can turn off Wi-Fi on a broadband router without powering
down the entire network.
• Stop Auto-Connecting to Open Wi-Fi Networks:
Connecting to an open Wi-Fi network such as a free wireless hotspot or your
neighbor’s router exposes your computer to security Risks.
• Enable firewall on each computer and the router.

Wirless Security By Zohaib Zeeshan

  • 1.
  • 2.
    What Is Wireless? •Wireless communication, or sometimes simply wireless, is the transfer of information or power between two or more points or computers that are not connected by an electrical wires. • Wireless technology has made dramatic changes in the way computer users communicate worldwide. Billions of home and business users have notebook computers, smart phones, and other mobile devices to access the Internet, send e-mail and instant messages, chat online, or share network connections all without wires.
  • 3.
    Continue… • Although wirelessaccess provides many conveniences to users, it also poses additional security risks. About 80 percent of wireless networks have no security protection. • To access the network, the individual must be in range of the wireless network. Some intruders intercept and monitor communications as they transmit through the air. Others connect to a network through an unsecured wireless access point (WAP). In one technique, called “war driving or access point mapping”, individuals attempt to detect wireless networks
  • 4.
    Continue… via their notebookcomputer or mobile device while driving a vehicle through areas they suspect have a wireless network. • Some individuals instead use “war flying”, where they use airplanes instead of vehicles to detect unsecured wireless networks.
  • 5.
    Wireless Security What iswireless Security? • It is the prevention of unauthorized access to computer using wireless networks. • In addition to using firewalls, some safeguards that improve the security of wireless networks include reconfiguring the wireless access point and ensuring equipment uses one or more wireless security standards such as Wi-Fi Protected Access and 802.11i.
  • 6.
    Types Of WirelessSecurity • WAP (wireless access point): A wireless access point (WAP) should be configured so that it does not broadcast a network name, known as an SSID (service set identifier). Users should change the default SSID to prevent unauthorized users from accessing their wireless network. The WAP also can be programmed so that only certain devices can access it. • WEP (Wireless Equivalent Privacy) It is one of the least secure form of security. It was developed for wireless networks and approved as a Wi-Fi security standard in September 1999. However there are bunch of security issues in WEP which also easy to break and hard to configure.
  • 7.
    Continue… • WPA (Wi-Fiprotected access): Wi-Fi Protected Access (WPA) is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques. • WPA2: It is also knows as 802.11i network, sometimes, the most recent network security standard, conforms to the government’s security standards and uses more sophisticated encryption techniques than WPA.
  • 8.
    Tips for WirelessNetwork Security • Change default Administrator Password: The password provided are simple and very well known to hackers on Internet. • Turn on Encryption: Encryption technology scrambles messages sent over wireless network , so they cannot easily read by humans. • Change the default SSID: Change your network’s SSID to something unique.
  • 9.
    Continue… • Enable MACAddress Filtering: With MAC address filtering, you specify which computers can access your network. • Position the router or access point safely: Wi-Fi signals leakage - easier for others to detect and exploit. Try to position the access point or router near the center of the home rather than near windows - minimize leakage.
  • 10.
    Continue… • Turn ofthe network during extended period of Non-Use: If you own a wireless router but are only using it wired (Ethernet) connections, you can turn off Wi-Fi on a broadband router without powering down the entire network. • Stop Auto-Connecting to Open Wi-Fi Networks: Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor’s router exposes your computer to security Risks. • Enable firewall on each computer and the router.