On Wireless Security #2
Last week we spoke about the need for Wireless Network security and we follow on this week by covering the different standards available
. To set up or alter your wireless security settings you will require the manual for your router as the configuration process varies from manufacturer to manufacturer. This should have been provided in the box in either paper format or on a CD-ROM but if you don't have either to hand then a copy should be freely available from the manufacturers website.
WEP (Wired Equivalent Privacy) - Introduced back in 1999, WEP is still one of the most popular encryption protocols. Despite the fact it has several serious weaknesses and can be readily cracked in minutes with freely available software, it is the default choice presented to a user when setting up security on a wireless network which probably explains its continued popularity.
The standard is so weak because it relies on a small piece of data being pre-pended to all transmissions which when matched to the key held by an authorised machine allows the data to be decrypted. With it being on almost every packet of data transmitted the cracking process just involves listening out for enough of them in order to obtain sufficient numbers to decrypt the key.
If however your wireless router seems to just support WEP then be sure to check out the manufacturers website as there is a good chance a free update for the routers firmware will be available to include the use of more sophisticated standards. In my opinion WEP should only be used if completely necessary as it is only an improvement over having nothing at all!
MAC Filtering - This will give you the power to grant individual machines access to your wireless network by pre-specifying their MAC addresses that are used to individually identify network adaptors.
This theory unfortunately suffers in the same way as WEP; someone with devious intentions only needs to listen to enough network traffic to be able to compile a list of possible MAC addresses. Once obtained, the hacker creates a bogus MAC address which causes your router to give access by fooling it in to thinking that it's speaking to an authorised machine.
Disabling SSID Broadcast - The SSID (Service Set IDentifier) has to be identical on both the router and client machine in order for them to communicate. In order to ease setup, the SSID broadcast reveals the location of your network to all computers within range so they can easily connect if required. The broadcast can be disabled which would then mean rather than searching for your local network you would be required to memorise the SSID. Unfortunately, as before, this can be easily circumvented by simply listening to network traffic with freely available software.
WPA (Wi-Fi Protected Access) - In the home market WPA usually relies on a pre-shared key which consists of a passphrase used to access the network. This passphrase can be from 8 to 63 characters long however in the interests of security I would suggest choosing at least 13 completely random characters. WPA succeeds where WEP failed as the encryption key pre-pended to the transmissions is changed frequently so that a hacker is unable to obtain sufficient data in order to decrypt the key.
In summary, I would recommend that all users with a wireless network ensure that firstly they are actually employing some form of wireless security and secondly that it is set to the secure WPA standard; whilst it is not unbreakable it is considered extremely secure and certainly the best that we have for now.
by: Chris Holgate
Experts behind the security systems- a humble locksmith Look Through Public Records To Learn About Safeness And Security Custom Lapel Pins To Enhance The Security Of Your Organization Be Cautious While Choosing Security System For Your Premise! Benefits of CCIE Security Certification Case Study on Security Measures Lincoln Nebraska Attorneys Help in Social Security Cases How to Remove Security Master AV Completely Now! Remove Antivirus 2010 Security Centre - How to Remove Antivirus 2010 Security Centre Completely Wan Optimization Prospects?? Application Acceleration Combined With Security The Security And Risk Of An Index Annuity Stay Safe: How To Choose A Cctv Security Surveillance System We Lost Power, Our Adt Security Didn't
www.yloan.com
guest:
register
|
login
|
search
IP(216.73.216.197) California / Anaheim
Processed in 0.026359 second(s), 5 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 18 , 3664, 221,