Learn how to a build a cloud-first strategyRegister Now


wireless network security

Posted on 2005-04-23
Medium Priority
Last Modified: 2013-11-16
Dear Experts

I need some advice here. I am IT officer working with government. Currently we are conducting an event around the country. The event require us to set a small network consist of 6-12 laptops. And all the laptops are connected to internet via dial up router/modem.

But early this month, we had started to use DSL. And i also had implemented Wireless network to be use with the DSL connection.

My question are, how can i make sure that the wireless connection that i had setup is totally or atleast secure from outside attack? All of the laptops are using Windows XP (SP 2). We had TrendMicro Antivirus + Firewall install on each laptop, but it's strange that if i enable the firewall, all the laptop will not able to connect to the internet (only can ping to the router).

And what kind or term of attacks that the hackers use for attacking wireless network? And what is actually they are attacking at? If they targeting to the wireless access point / router / individual laptops / the whole network?

Is there any software that i can use to monitor the wireless network that i have setup and monitor the user/people connect to the connection?

You help is much appreciated. Thank you in advance.


*please excuse my english.
Question by:btmksm
1 Comment
LVL 12

Accepted Solution

srikrishnak earned 2000 total points
ID: 13850252
A best bet to start with is,

The following links will be definitely useful as well..
Added to the above, basically security is not a attribute of some device or certain part..its a overall system...For example if you are considering Wireless security you must consider the end to end security as well..Say you have the best secure system for wireless lan(which is access media) but how about the end points(Notebooks)...if these two are secured how about the transmission of information..its pretty susceptable to theft...so to mitigate all this we have tools like encryption,vpn etc etc...
A good place to start is again the NIST website/CIST website...
Hope this will be helpful to you..

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Concerto Cloud Services, a provider of fully managed private, public and hybrid cloud solutions, announced today it was named to the 20 Coolest Cloud Infrastructure Vendors Of The 2017 Cloud  (http://www.concertocloud.com/about/in-the-news/2017/02/0…
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Suggested Courses
Course of the Month20 days, 22 hours left to enroll

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question