With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person
With the talk about the categories of attackers, the issue of wireless security and how to protect your network comes up. There are three types of security protection, MAC filtering, WEP, and authentication. Each has a different way to secure the network against unauthorized access. MAC filtering allows only traffic from specific client stations to pass through the network based on their unique MAC addresses (Coleman & Westcott, 2012). This gives the administrator the ability to lock the network down to only the devices they want on the network, giving another layer of security. WEP, or wired equivalent privacy, uses a hexadecimal or ASCII character key to secure traffic on the network. Finally, authentication is done by the access point sending a challenge to be encrypted by the client and finally sent back to the access point for verification. Looking at all three, MAC filtering would be the best way to secure a wireless network. While people can spoof MAC addresses, allowing the hacker to change the MAC address of the client, that person