Preview

Wireless Security

Powerful Essays
Open Document
Open Document
3376 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Security
Wireless Security Problems and Solutions

INDEX:

1. Abstract……………………………………3
2. Introduction………………………………..3
3. WEP and the Small Network……………...4
4. Larger Wireless Environments…………….5
5. VPN……………………………………….6
6. War Driving and War Chalking…………...6
7. Conclusion…………………………………8
8. Biblography………………………………..9

Abstract:

The need for security on any network is apparent: the prevention of eavesdropping and the desire for authentication has been the main focus of many network administrators. However, the problems that already exist are added to when you add wireless networking to the equation. As wireless networking becomes more popular, the flawed security of most of those networks becomes more apparent.

Several organizations have devised ways to secure their wireless networks from intruders. However, there is currently no wireless security implementation that everyone agrees is always suitable, regardless of what network it is to be used on. Some implementations are satisfactory for some environments, and there is work underway to create future solutions. Meanwhile, some wireless users make the situation more difficult as they advertise existing vulnerable networks.

Introduction:

Eavesdropping and Authentication ,The security of any network is an important issue. No one likes the idea that the possibility exists that someone could be intercepting their Internet traffic, reading their email, ordering items with their credit cards, or sending inappropriate messages to their boss in their name. Security of wired networks is often a
Primary objective of system administrators.

When considering a network with a Wireless Access Point, or “WAP”, available,new security concerns come into play. Because wireless is broadcast in nature, anyone within range of a wireless card can intercept the packets being sent out without interrupting the flow of data between wireless card and base station. It is because of this that

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hit-150-Wk4D1

    • 539 Words
    • 3 Pages

    (1) security features or software that protect information when a wireless network is used. (2) non-redisclosure policies. (3) storage and retention policies.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    6. Connecting network elements by radio waves instead of wires presents many challenges. From the reliability standpoint, it is difficult to predict a priori the dependable coverage of a wireless network radio inside a building. Wireless LANs broadcast data into space, where they can be intercepted by anyone with the ability to listen in at the appropriate frequency.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It-242 Wlan Check Point

    • 265 Words
    • 2 Pages

    There are several ways a person can go about securing a wireless local area network, or WLAN. One of the best ways in my opinion is to not broadcast the network publicly. This does not prevent people from accessing the network, but instead prevents the network from being visible to others. A person searching for a network to connect to can easily see your network exists. Without broadcasting the network people that are not aware of your network have no way of even knowing it is there. Another way to help to secure a WLAN is by using MAC address filtering. MAC filtering requires a list of the valid MAC addresses the user wants to be able to access the network. Any computer with a MAC address that is not on the provided list will not be able to gain access to the network. These steps alone are not enough to keep a network secure but when used with other security measures such as strong passwords and encryption can make a network a lot less accessible from malicious outsiders. These individuals can be a bothersome hindrance stealing network bandwidth or far more dangerous individuals that intend to cause harm with malicious programs or viruses or to steal private information. A wireless network may never be completely secure, but it is always best practice to use as many security steps as possible to insure the safety of the data on the network.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wireless connections open our network to potential threats. We should do everything possible to limit the number of allowed wireless devices on our network. I suggest that we enforce a policy of a primary and secondary wireless network. This would allow us to give our employees the functions they need while maintaining a secure network. Our primary network will be secured with Wi-Fi Protected Access version 2 (WPA2) and the user of a complex passphrase to prevent brute force attacks. This section of our network will have a limited number of users allowed,…

    • 904 Words
    • 4 Pages
    Good Essays
  • Better Essays

    A wireless policy for a medium-sized banking organization will need to deploy a wireless LAN to the network and there will not need to be onsite IT staff as that can be outsourced to various vendors and business specializing in such. The remote access can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system.…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following:…

    • 610 Words
    • 3 Pages
    Good Essays