INDEX:
1. Abstract……………………………………3
2. Introduction………………………………..3
3. WEP and the Small Network……………...4
4. Larger Wireless Environments…………….5
5. VPN……………………………………….6
6. War Driving and War Chalking…………...6
7. Conclusion…………………………………8
8. Biblography………………………………..9
Abstract:
The need for security on any network is apparent: the prevention of eavesdropping and the desire for authentication has been the main focus of many network administrators. However, the problems that already exist are added to when you add wireless networking to the equation. As wireless networking becomes more popular, the flawed security of most of those networks becomes more apparent.
Several organizations have devised ways to secure their wireless networks from intruders. However, there is currently no wireless security implementation that everyone agrees is always suitable, regardless of what network it is to be used on. Some implementations are satisfactory for some environments, and there is work underway to create future solutions. Meanwhile, some wireless users make the situation more difficult as they advertise existing vulnerable networks.
Introduction:
Eavesdropping and Authentication ,The security of any network is an important issue. No one likes the idea that the possibility exists that someone could be intercepting their Internet traffic, reading their email, ordering items with their credit cards, or sending inappropriate messages to their boss in their name. Security of wired networks is often a
Primary objective of system administrators.
When considering a network with a Wireless Access Point, or “WAP”, available,new security concerns come into play. Because wireless is broadcast in nature, anyone within range of a wireless card can intercept the packets being sent out without interrupting the flow of data between wireless card and base station. It is because of this that