Solved

Open access for all users

Posted on 2008-10-26
4
207 Views
Last Modified: 2013-11-25
hi all, am new here. I would like to know the problems that may arise when talking about open access to a wireless network and what are the recommendation that can be proposed to counteract. Also wanna know how access to the wireless network should be set up and run and the reasons for such proposal?
0
Comment
Question by:Alv45525
4 Comments
 
LVL 12

Expert Comment

by:Steve
ID: 22810249
if you leave your wireless access point OPEN for all users, it means anyone in the local vicinity to you with a wireless capable device (notebook etc), can connect to your access point and use your local network/internet connection without your knowledge..

easiest method to secure your wireless access point is to setup WEP encryption at 64bits and assign your phone number as the password (10digits long) that way when you connect your machines to the access point and are prompted for hte password you wont need to remember the long Hexadecimal password it creates..

that way the only way you can connect is if you know that the password for the access point is your phone number.. and you'll be secure..
0
 
LVL 14

Accepted Solution

by:
Roachy1979 earned 125 total points
ID: 22810938
An open access point is a massive business risk.  Any information sent wirelessly can be captured, and even modified.  Any passwords that are sent in plain text can also be captured - you are also allowing external parties unmonitored access to your internal network.

While WEP provides a little more security I still wouldn't recommend it.  Data can be captured from a WEP connection, ultimately allowing the key to be cracked and allowing third parties to connect to your network.  WEP also stands for Wired Equivalent Privacy...the security provided by WEP is similar to that provided through the use of a Hub....any traffic on a WEP network can be sniffed by anyone connected to the network.....

I strongly recommend doing a Google search for "cracking WEP" - you will find a plethora of sites detailing the methods used to do this, and illustrating how easy this is to do with a few freely available tools.

The other risk associated with using an open network is that attackers could use your network to their own ends - installing rootkits and viruses on connected machines, spamming through your network or hosting or downloading illegal files....In short it's not just a risk to your data, but also the potential misuse of your network resources and bandwidth for illegal or immoral purposes.

I would consider WPA/WPA2 PSK security if your Access Point and Clients support it.  Never use a dictionary password and try to use a combination of upper case and lower case letters, numbers and ASCII characters...

Hope this helps

P
0
 
LVL 10

Expert Comment

by:ampranti
ID: 22817304
Assuming you talk about an enterpise network you should prefer WPA + EAP.
WPA encrypts your data, preventing sniffing and unauthorized reveal.

EAP will allo users to authenticate , for example against your Active Directory or LDAP.
EAP strenght is based on password strenght

For medium size bussiness WPA PSK (Preshare Key) is more than enough (and usually recommended)
0
 

Author Closing Comment

by:Alv45525
ID: 31510201
Thx 4 helping
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Agile and Scrum have almost become synonymous. Have you wondered what's the difference? Scrum is just one way to be Agile. It is the most popular which leads to the common confusion. Agile actually refers to a philosophy shared by group of developme…
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now