Preview

Wlan Security Threats

Satisfactory Essays
Open Document
Open Document
373 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wlan Security Threats
Telecomm For Business

Dear Friend, I heard that you were installing a wireless LAN in your small business, but you were concerned about security. Well when it comes to installing a wireless LAN, there are several security threats that you should be aware of beforehand. There are four common security threats, which are drive-by hackers, war drivers, unprotected access points, and rogue access points. Drive-by hackers, which are the most serious threats of them all, are people that sit outside a company’s premises and intercept the firm’s data transmissions. They can also mount denial-of-service attacks, send malware into the network, and do other mischief. You should watch out because the software that they use is usually downloaded from the Internet. War drivers are people who drive around a city looking for working access points that are unprotected. War driving is not illegal. Only if they break in do they become drive-by hackers. Unprotected access points are access points that drive-by hackers can associate with by gaining access to the local area network without going through the site firewall. And rogue access points are unauthorized access points that are set up by a department or an individual. They often have poor security, so it makes drive-by hacking a much easier task. To prevent these threats from happening, you should follow the 802.11 core security standards, which provides protection between the wireless access point and the wireless host. This protection includes confidentiality, authentication, and message integrity. A drive-by hacker cannot intercept traffic to read it or send its own messages to the access points. But since this protection isn’t provided from end-to-end, you should also use 802.11i security protection, which uses extremely strong AES-CCMP encryption. It has a 128-bit key encryption and a key management method for automatically changing keys. It uses the strongest security algorithms, so it

You May Also Find These Documents Helpful

  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Unit 1 NT1310 Lab 1

    • 712 Words
    • 3 Pages

    Ease of installation: Wireless networks have become commonplace with Wireless N being the current standard. While it is easy to purchase a wireless router, connect it to the Internet, and install in either a home or office setting, it is best to have a network professional install and configure the wireless router in your practice. You want to ensure that you have high security enabled and that there is sufficient wireless coverage throughout all areas within the practice.…

    • 712 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    6. Connecting network elements by radio waves instead of wires presents many challenges. From the reliability standpoint, it is difficult to predict a priori the dependable coverage of a wireless network radio inside a building. Wireless LANs broadcast data into space, where they can be intercepted by anyone with the ability to listen in at the appropriate frequency.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    For a business setting up a WLAN security is very important and should be top priority. If you do not secure your WLAN you are opening your business up to hackers that can ruin your business. Before you set up the WLAN a site survey should be done. This will determine what level of exposure your company is at and help decide how much security is needed.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    If you are unable to learn the router settings as different models in the market have different settings then you should install the apps on your desktop to learn about the network that are free for use.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    With any network, including a WLAN, there are inherent risks involved. With a WLAN, the wireless aspect opens up additional avenues for hackers or data being compromised. There could be tech-savvy students who could access the network and get into data that they shouldn’t see or modify. A student could obtain the teachers credentials by simply looking over their shoulder or watching them. Also, any outside entities could get within range of the wireless and access the network, if they’re good enough. Wireless can be easily intercepted and accessed.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will use WPA2 authentication for all wireless devices. WPA2 is important as it can be configured for any device including phones and wireless printers…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wlan vs Lan's

    • 520 Words
    • 3 Pages

    In life today, networking has become a large part of our lives. It is the fastest way to transport data, and it is accessible wherever you are in the world. These connections are called LANs. LAN (local area network) is a group of computers and other electronic devices that are connected via a communications line. The LAN’s I will talk about are wired and wireless LANS. Before wireless networking, everything was connected with wires. However, today data can be transported wirelessly as well. In this paper, I will talk about how I would go about practicing my LAN design.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    I. Thou shalt place high priority on security, for hackers lurketh, thieves stealeth and employees bungleth A Wi-Fi-enabled computer can connect to multiple networks at the same time. Your employees can give a hacker a pathway into your internal network simply by powering up a laptop. Imagine the mess an eco-terrorist could make if he didn’t like the look of your smokestack. Even your well-intentioned employees can bring a network down, simply by blundering around in areas they shouldn’t. Don’t take chances with network security. Most wireless systems employ industry-standard WEP (Wired Equivalent Privacy). A hacker can get around it within a few hours. Look into more powerful standards like Extensible Authentication Protocol and Tunneled Extensible Authentication Protocol. Never assume that your industrial Ethernet products have built-in security features. At the very least, you should use inspection-type firewalls (such as packet filters) to control any access that is based on IP source address, destination address, and port number. Don’t just talk about changing your passwords a regular basis. Do it. And don’t make them easy to guess. Consumer plug and play devices can flood your network with traffic in a "broadcast storm" as they try to selfconfigure or advertise their presence to every other node on the network. Faulty devices can vomit zillions of “runts”, or abnormally short Ethernet frames. Using switches instead of hubs will take care of those problems. Duplicate IP addresses can deactivate devices that otherwise appear to be perfectly functional. II. Thou shalt document thine installation, so that even Homer Simpson mayest discern the system whither thou goest; for to write the IP address on your hand or your forehead shall not be deemed sufficient Document your installation. When devices need to be replaced it needs to happen quickly. Things you need to know and document for every device: - Replacement…

    • 1289 Words
    • 6 Pages
    Powerful Essays