Wi-Fi Security

Topics: Wi-Fi, Wireless access point, Wireless LAN Pages: 5 (1913 words) Published: February 15, 2012
Wi-Fi is the system of wireless connecting devices, which use some radio waves that allow for the connection between the devices without expenses of the cumbersome cable or without requiring them for being facing the other. Wireless-Fidelity (Wi-Fi) network would provide the computer experts with option to remove the wired network (Wekhande, 2006). Badly secured Wi-Fi networks may be utilized for attacking the networks as well as corporations from inside, rather than about attempting to do that externally by Internet. The purpose of the report is to describe about the Wi-Fi Security. Firstly it discusses Wi-Fi (802.11) Security. Then it reviews the risks as well as the precautions prior to opening the Wi-Fi network for the others, after that it gives recommendations for closing the Wi-Fi Network to the strangers and how to be alert while sending very sensitive information over the Wi-Fi Networks. What is Wi-Fi Security?

Wi-Fi is cryptographic based methods for enabling the security. Wired Equivalent Privacy as well as Wi-Fi Protected Access security techniques give us security (Rowan, 2010). Privacy: the data that has been transmitted within a network must not be readable to anybody however those communicating. Authentication: Only clients who are aware about shared secret can connect to network. Wi-Fi Protected Access had been initial cryptographic protocol which has been made for the Wi-Fi for enabling the privacy as well as authentication. But Wi-Fi Protected Access had not been fully secure. For rectifying the security issues with Wi-Fi Protected, Wi-Fi Alliance has introduced cryptographic protocol i.e. Wi-Fi Protected Access. From that time the general practice about securing the Wi-Fi Protected Access enabled network with the passwords was discovered of being vulnerable towards the offline dictionary attack. Even if Wi-Fi Protected Access has been thought to be very secure rather than from the dictionary attack, this had been the quick fix to problems in the Wi-Fi Protected Access. Wi-Fi Protected Access has been the subset of Robust Security Network that had been introduced in the initial draft of the security standard which is made through Institute of Electrical and Electronics Engineers (IEEE) called as 802.11i (A.K.M Nazmus Sakib, 2011). Wi-Fi (802.11) Security

Nowadays several Internet users have been using the Wi-Fi or the 802.11 networks for connecting wirelessly to Internet (Kjell J. Hole, 2005). It is a latest as well as available technology that has been used for networking the homes. To connect Internet wirelessly provides complete fresh set of the security concerns. When we have been setting up the wireless Wi-Fi network at our home, we are provided to have some additional security precautions for keeping our computer safe as well as secure (Reynolds, 2003). Several people choose for leaving the Wi-Fi networks open thus creating hot spot in which any random passerby may access Internet. Many passersby do not harm us or to our computers. So we must know risks prior to opening up our hot spot for public. Risks as well as Precautions prior to Opening our Wi-Fi Network for Others Either Hot Spot is Violating the Terms of Service ISP

Few Internet providers do not allow their users to share its Internet bandwidth among the neighbors as well as strangers through Wi-Fi. Those prohibitions are a part of terms of service which we have agreed, when we have signed up for ISP service (Sheldon, 2001). Either Computer as well as Network is Secure

We should be sure that our password must be hard to guess however it should also be easier for us remember. It is particularly essential when we are having home network of computers. We do not want that people should use our Wi-Fi connection for gaining easier access to our computer. In the Windows XP we can set our password in Control Panel in the option User Accounts (Roeder, 2003). Changing the Default Password of Base Station

Several Wi-Fi base stations are...

References: A.K.M Nazmus Sakib, e. a. (2011). Security Improvement of IEEE 802.11i Wi-Fi Protected
Access 2
Fleishman, G. (2011). How to stay safe at a public Wi-Fi hotspot.
Gold, S. (2011). Cracking wireless networks. Network Security , 14-17.
Helping Define 802.11n and other Wireless LAN Standards. (2012). Retrieved February 12th,
2012, from http://www.intel.com: http://www.intel.com/standards/case/case_802_11.htm
Kjell J. Hole, E. D. (2005). Securing Wi-Fi Networks. Published by the IEEE Computer Society ,
Ku, A. (2011). Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud. Retrieved
February 12th, 2012, from http://www.tomshardware.com: http://www.tomshardware.com/reviews/wireless-security-hack,2981.html
Lehembre, G. (2005). Wi-Fi security – WEP, WPA .
http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf .
Reynolds, J. (2003). Going Wi-Fi: A Practical Guide to Planning and Building an 802.11
Roeder, F. O. (2003). Wi-Fi Handbook. New York: McGraw-Hill.
Rowan, T. (2010). Negotiating WiFi security. Network Security , 8-11.
Sheldon, T. (2001). Encyclopedia of Networking. New York: McGraw-Hill.
US-CERT. (2006). Using Wireless Technology Securely. Government organization.
Waring, B. (2007). How to Secure Your Wireless Network. PCWorld .
Wireless Security. (2012). Retrieved February 12th, 2012, from http://www.findingdulcinea.com:
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Wi-Fi Protection with Wi-Fi P+ Essay
  • Wi Fi Essay
  • Essay about Wi Fi Technology
  • Wireless Security and Threats Essay
  • Computer Networking Security Essay
  • The Concept of Wireless Security Essay
  • Essay on Analysis of Wireless Security Vulnerabilities, Attacks, and Methods of Protection
  • Information Systems and Security Audit Essay

Become a StudyMode Member

Sign Up - It's Free