Wireless Security

Only available on StudyMode
  • Download(s) : 182
  • Published : May 3, 2013
Open Document
Text Preview
Wireless Security Problems and Solutions

INDEX:

1. Abstract……………………………………3
2. Introduction………………………………..3
3. WEP and the Small Network……………...4
4. Larger Wireless Environments…………….5
5. VPN……………………………………….6
6. War Driving and War Chalking…………...6
7. Conclusion…………………………………8
8. Biblography………………………………..9

Abstract:

The need for security on any network is apparent: the prevention of eavesdropping and the desire for authentication has been the main focus of many network administrators. However, the problems that already exist are added to when you add wireless networking to the equation. As wireless networking becomes more popular, the flawed security of most of those networks becomes more apparent.

Several organizations have devised ways to secure their wireless networks from intruders. However, there is currently no wireless security implementation that everyone agrees is always suitable, regardless of what network it is to be used on. Some implementations are satisfactory for some environments, and there is work underway to create future solutions. Meanwhile, some wireless users make the situation more difficult as they advertise existing vulnerable networks.

Introduction:

Eavesdropping and Authentication ,The security of any network is an important issue. No one likes the idea that the possibility exists that someone could be intercepting their Internet traffic, reading their email, ordering items with their credit cards, or sending inappropriate messages to their boss in their name. Security of wired networks is often a Primary objective of system administrators.

When considering a network with a Wireless Access Point, or “WAP”, available,new security concerns come into play. Because wireless is broadcast in nature, anyone within range of a wireless card can intercept the packets being sent out without interrupting the flow of data between wireless card and base station. It is because of this that wireless network security is somewhat more concentrated than that of wired networks. Network administrators with WAP’s tend to focus on the security between the wireless card and the base station.

After packets leave the base station on the wired side, administrators can rely on more conventional security features already in place on their wired networks to protect the information in question.There are two main issues that wireless security solutions tend to address. First, since all wireless packets are available to anyone who listens, security is needed to prevent eavesdropping. The second issue is authentication. With a wired network, a system administrator might determine who generated certain traffic based on the physical port that the traffic came in on. By assuming that inbound traffic on a particular port is always coming from a certain source, there is no need to constantly verify where the traffic was coming from. However, with wireless networking, many users can access the network at the same access point, making it more difficult to map who did what. It is often desirable, therefore, to allow users to identify who they are before letting them through the base station onto the rest of the network. This prevents unauthorized usage while having the added bonus of being able to track a particular user’s activity should the need arise.

When considering a security solution for your wireless network, it is important to keep these issues in mind. However, for various reasons, it isn’t always possible to get a total solution for your network.

WEP and the Small Network:
The idea of a no-wires network is becoming more appealing to home and small office users every day. The cost of such connectivity, as opposed to paying someone to install ategory 5e cable in your house wherever you think you might want to use your laptop, is decreasing every day. “With the huge volume of cards being offered by close to 100 vendors, prices have plummeted to...
tracking img