Solved

Wireless Security

Posted on 2003-12-01
9
215 Views
Last Modified: 2013-12-04
Hi,

Can anyone help me. I have been ask to do a project on wireless network security which I totally don't know what is that.

Can anyone advise how should i start going about to know what it is all about.

What are the basics that I should know.
0
Comment
Question by:violetray
  • 8
9 Comments
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 50 total points
ID: 9848899
Hi violetray,
Lots of people are interested in wireless LAN security nowadays. Given that level of interest, there's a need for accurate information on how the current standards work, what's wrong with them, and the current thinking on how to fix the problems. This page tries to gather relevant papers and standards in a single place.

Trends and overview
Ethernet Everywhere
Ethernet is on the verge of becoming the preferred technology for LAN (wired and wireless), SAN, MAN and WAN.  Increasing in speed by an order of magnitude every 3 years, "Ethernet Everywhere" could be to the next decade what "IP everywhere" was to the 1990s.
IEEE 802.1X "network Port Authentication" was designed to scale with Ethernet, adding no per-packet overhead, and bringing the management technology of dialup networks to the wired and wireless LAN worlds. Here are presentations on the current trends in Ethernet network access, both wired and wireless, and an introduction to IEEE 802.1X and its applications.

http://www.drizzle.com/~aboba/IEEE/

PeteL
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 9848904
violetray,
Wireless LAN Security FAQ
http://www.iss.net/wireless/WLAN_FAQ.php
PL
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 9848912
violetray,
Wireless Network Security

http://csrc.nist.gov/publications/drafts/draft-sp800-48.pdf
PL
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 57

Expert Comment

by:Pete Long
ID: 9848921
violetray,
Exploiting and Protecting 802.11b Wireless Networks
http://www.extremetech.com/article2/0,3973,1159639,00.asp
PL
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 50 total points
ID: 9848926
violetray,
inetd: Getting the most out of WEP
John C. Welch
Monday, August 6, 2001


So, I've read yet another article on how someone has managed to hack the Wired Equivalent Privacy (WEP) encryption for 802.11b wireless networks, aka Wi-Fi and Airport. Once again, the clamor rises that the IEEE is using shoddy encryption, and that they are leaving the poor consumers and users of 802.11b networks open for the foulest kind of violations.

Well, that's only partially true, and most of the panic arises from an essential misunderstanding of what WEP is, and some less than perfectly forthright marketing by the wireless networking dealers.

What WEP isn't and is ............

http://workingmac.com/inetd/22.wm

PL
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 9848927
violetray,
If your wireless LAN is located in a single family home, then you are probably more at risk from intruders coming in via your Internet connection than from folks gaining access to your LAN over the air.  But if your LAN has some means of wireless connectivity, you've added another way to access your LAN that doesn't require getting past your router's firewall and doesn't even require physical access!
http://www.practicallynetworked.com/support/wireless_secure.htm

PL
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 9848932
0
 

Accepted Solution

by:
komad earned 50 total points
ID: 9850065
Hi,

The basics could be:

Compare LAN and WLAN. Try to figure out the difference between two (besides "there is no cable"). AP-switch, WLAN client-lan client.

You'll see that the only difference that matters is Layer1, the CABLE. Since info goes all around anyone can listen to it. There are several means to protect your network. First, configure the devices correctly, perhaps disable the DHCP, specify new passwords (the longer the better). Than implement WEP on AP (again the longer the better). You can limit access on AP,so it  only allows specified MAC addresses to access the AP. On top of all, you can encrypt everything with IPSec.


0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10452416
ThanQ
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
OfficeMate Freezes on login or does not load after login credentials are input.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question