wireless network security

Posted on 2005-04-23
Last Modified: 2013-11-16
Dear Experts

I need some advice here. I am IT officer working with government. Currently we are conducting an event around the country. The event require us to set a small network consist of 6-12 laptops. And all the laptops are connected to internet via dial up router/modem.

But early this month, we had started to use DSL. And i also had implemented Wireless network to be use with the DSL connection.

My question are, how can i make sure that the wireless connection that i had setup is totally or atleast secure from outside attack? All of the laptops are using Windows XP (SP 2). We had TrendMicro Antivirus + Firewall install on each laptop, but it's strange that if i enable the firewall, all the laptop will not able to connect to the internet (only can ping to the router).

And what kind or term of attacks that the hackers use for attacking wireless network? And what is actually they are attacking at? If they targeting to the wireless access point / router / individual laptops / the whole network?

Is there any software that i can use to monitor the wireless network that i have setup and monitor the user/people connect to the connection?

You help is much appreciated. Thank you in advance.


*please excuse my english.
Question by:btmksm
    1 Comment
    LVL 12

    Accepted Solution

    A best bet to start with is,

    The following links will be definitely useful as well..
    Added to the above, basically security is not a attribute of some device or certain part..its a overall system...For example if you are considering Wireless security you must consider the end to end security as well..Say you have the best secure system for wireless lan(which is access media) but how about the end points(Notebooks)...if these two are secured how about the transmission of information..its pretty susceptable to to mitigate all this we have tools like encryption,vpn etc etc...
    A good place to start is again the NIST website/CIST website...
    Hope this will be helpful to you..

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    How to configure Site to Site VPN on a Cisco ASA.     (version: 1.1 - updated August 6, 2009) Index          [Preface]   1.    [Introduction]   2.    [The situation]   3.    [Getting started]   4.    [Interesting traffic]   5.    [NAT0]   6.…
    Have you experienced traffic destined through a Cisco ASA firewall disappears and you do not know if the traffic stops in the firewall or somewhere else? The solution is the capture feature. This feature was released in 6.2(1) and works in all firew…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now