Wireless Security

Hi,

Can anyone help me. I have been ask to do a project on wireless network security which I totally don't know what is that.

Can anyone advise how should i start going about to know what it is all about.

What are the basics that I should know.
violetrayAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

 
Pete LongTechnical ConsultantCommented:
Hi violetray,
Lots of people are interested in wireless LAN security nowadays. Given that level of interest, there's a need for accurate information on how the current standards work, what's wrong with them, and the current thinking on how to fix the problems. This page tries to gather relevant papers and standards in a single place.

Trends and overview
Ethernet Everywhere
Ethernet is on the verge of becoming the preferred technology for LAN (wired and wireless), SAN, MAN and WAN.  Increasing in speed by an order of magnitude every 3 years, "Ethernet Everywhere" could be to the next decade what "IP everywhere" was to the 1990s.
IEEE 802.1X "network Port Authentication" was designed to scale with Ethernet, adding no per-packet overhead, and bringing the management technology of dialup networks to the wired and wireless LAN worlds. Here are presentations on the current trends in Ethernet network access, both wired and wireless, and an introduction to IEEE 802.1X and its applications.

http://www.drizzle.com/~aboba/IEEE/

PeteL
0
 
Pete LongTechnical ConsultantCommented:
violetray,
Wireless LAN Security FAQ
http://www.iss.net/wireless/WLAN_FAQ.php
PL
0
 
Pete LongTechnical ConsultantCommented:
violetray,
Wireless Network Security

http://csrc.nist.gov/publications/drafts/draft-sp800-48.pdf
PL
0
WEBINAR: 10 Easy Ways to Lose a Password

Join us on June 27th at 8 am PDT to learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees. We'll cover the importance of multi-factor authentication and how these solutions can better protect your business!

 
Pete LongTechnical ConsultantCommented:
violetray,
Exploiting and Protecting 802.11b Wireless Networks
http://www.extremetech.com/article2/0,3973,1159639,00.asp
PL
0
 
Pete LongTechnical ConsultantCommented:
violetray,
inetd: Getting the most out of WEP
John C. Welch
Monday, August 6, 2001


So, I've read yet another article on how someone has managed to hack the Wired Equivalent Privacy (WEP) encryption for 802.11b wireless networks, aka Wi-Fi and Airport. Once again, the clamor rises that the IEEE is using shoddy encryption, and that they are leaving the poor consumers and users of 802.11b networks open for the foulest kind of violations.

Well, that's only partially true, and most of the panic arises from an essential misunderstanding of what WEP is, and some less than perfectly forthright marketing by the wireless networking dealers.

What WEP isn't and is ............

http://workingmac.com/inetd/22.wm

PL
0
 
Pete LongTechnical ConsultantCommented:
violetray,
If your wireless LAN is located in a single family home, then you are probably more at risk from intruders coming in via your Internet connection than from folks gaining access to your LAN over the air.  But if your LAN has some means of wireless connectivity, you've added another way to access your LAN that doesn't require getting past your router's firewall and doesn't even require physical access!
http://www.practicallynetworked.com/support/wireless_secure.htm

PL
0
 
Pete LongTechnical ConsultantCommented:
0
 
komadCommented:
Hi,

The basics could be:

Compare LAN and WLAN. Try to figure out the difference between two (besides "there is no cable"). AP-switch, WLAN client-lan client.

You'll see that the only difference that matters is Layer1, the CABLE. Since info goes all around anyone can listen to it. There are several means to protect your network. First, configure the devices correctly, perhaps disable the DHCP, specify new passwords (the longer the better). Than implement WEP on AP (again the longer the better). You can limit access on AP,so it  only allows specified MAC addresses to access the AP. On top of all, you can encrypt everything with IPSec.


0

Experts Exchange Solution brought to you by ConnectWise

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
 
Pete LongTechnical ConsultantCommented:
ThanQ
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.