Solved

Wireless Security

Posted on 2003-12-01
9
213 Views
Last Modified: 2013-12-04
Hi,

Can anyone help me. I have been ask to do a project on wireless network security which I totally don't know what is that.

Can anyone advise how should i start going about to know what it is all about.

What are the basics that I should know.
0
Comment
Question by:violetray
  • 8
9 Comments
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 50 total points
Comment Utility
Hi violetray,
Lots of people are interested in wireless LAN security nowadays. Given that level of interest, there's a need for accurate information on how the current standards work, what's wrong with them, and the current thinking on how to fix the problems. This page tries to gather relevant papers and standards in a single place.

Trends and overview
Ethernet Everywhere
Ethernet is on the verge of becoming the preferred technology for LAN (wired and wireless), SAN, MAN and WAN.  Increasing in speed by an order of magnitude every 3 years, "Ethernet Everywhere" could be to the next decade what "IP everywhere" was to the 1990s.
IEEE 802.1X "network Port Authentication" was designed to scale with Ethernet, adding no per-packet overhead, and bringing the management technology of dialup networks to the wired and wireless LAN worlds. Here are presentations on the current trends in Ethernet network access, both wired and wireless, and an introduction to IEEE 802.1X and its applications.

http://www.drizzle.com/~aboba/IEEE/

PeteL
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
violetray,
Wireless LAN Security FAQ
http://www.iss.net/wireless/WLAN_FAQ.php
PL
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
violetray,
Wireless Network Security

http://csrc.nist.gov/publications/drafts/draft-sp800-48.pdf
PL
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
violetray,
Exploiting and Protecting 802.11b Wireless Networks
http://www.extremetech.com/article2/0,3973,1159639,00.asp
PL
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 50 total points
Comment Utility
violetray,
inetd: Getting the most out of WEP
John C. Welch
Monday, August 6, 2001


So, I've read yet another article on how someone has managed to hack the Wired Equivalent Privacy (WEP) encryption for 802.11b wireless networks, aka Wi-Fi and Airport. Once again, the clamor rises that the IEEE is using shoddy encryption, and that they are leaving the poor consumers and users of 802.11b networks open for the foulest kind of violations.

Well, that's only partially true, and most of the panic arises from an essential misunderstanding of what WEP is, and some less than perfectly forthright marketing by the wireless networking dealers.

What WEP isn't and is ............

http://workingmac.com/inetd/22.wm

PL
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
violetray,
If your wireless LAN is located in a single family home, then you are probably more at risk from intruders coming in via your Internet connection than from folks gaining access to your LAN over the air.  But if your LAN has some means of wireless connectivity, you've added another way to access your LAN that doesn't require getting past your router's firewall and doesn't even require physical access!
http://www.practicallynetworked.com/support/wireless_secure.htm

PL
0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
0
 

Accepted Solution

by:
komad earned 50 total points
Comment Utility
Hi,

The basics could be:

Compare LAN and WLAN. Try to figure out the difference between two (besides "there is no cable"). AP-switch, WLAN client-lan client.

You'll see that the only difference that matters is Layer1, the CABLE. Since info goes all around anyone can listen to it. There are several means to protect your network. First, configure the devices correctly, perhaps disable the DHCP, specify new passwords (the longer the better). Than implement WEP on AP (again the longer the better). You can limit access on AP,so it  only allows specified MAC addresses to access the AP. On top of all, you can encrypt everything with IPSec.


0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
ThanQ
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
OfficeMate Freezes on login or does not load after login credentials are input.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now