Wireless Lan

Read Complete Research Material

WIRELESS LAN

Wireless LAN Vulnerabilities? Threats and Countermeasures

Table Of Contents

Introduction4

Wireless Vulnerabilities? Threats and Countermeasures5

Wireless Network Attacks Accidental association6

Malicious association6

Ad-hoc networks7

Non-traditional networks7

Identity robbery (MAC spoofing)8

Man-in-the-middle attacks8

Denial of service9

Network injection10

Caffe Latte attack10

Securing Wireless Transmissions10

Protecting the Confidentiality of Wireless Transmissions11

Signal-Hiding Techniques11

Encryption12

Preventing Alteration of Intercepted Communications12

Countermeasures to Reduce the Risk of Denial-of-Service Attacks12

Securing Wireless Access Points13

Countermeasures to Secure Wireless Access Points13

Eliminate Rogue Access Points13

Secure Configuration of Authorized Access Points14

Use 80x to authenticate all Devices14

Securing Wireless Client Devices14

Securing Wireless Networks15

Use of Encryption15

Use anti-virus and anti-spy ware programs? and a firewall15

Turn off identifier broadcasting16

Change the identifier on your router from the default16

Change your router's pre-set password for administration17

Allow only exact computers to get access to your wireless network17

Turn off your wireless mesh when you understand you won't use it17

Don't suppose that public "hot spots" are secure18

Training and Educating Users18

Network Auditing18

Conclusion19

Wireless LAN Vulnerabilities? Threats and Countermeasures

Introduction

Wireless networking presents numerous benefits Productivity advances because of expanded accessibility to data resources. Network configuration and reconfiguration is simpler? much quicker? and less expensive. However? wireless expertise furthermore conceives new risks and adjusts the living data security risk profile. For demonstration? because communications takes location "through the air" utilising wireless frequencies? the risk of interception is larger than with connected networks. If the note is not encrypted? or encrypted with a feeble algorithm? the attacker can read it? thereby compromising confidentiality. Although wireless networking adjusts the dangers affiliated with diverse risks to security? the general security objectives stay the identical as with connected networks: maintaining confidentiality? double-checking integrity? and sustaining accessibility of the data and data systems. The target of this paper is to aid managers in making such conclusions by supplying them with a rudimentary comprehending of the environment of the diverse risks affiliated with wireless networking and accessible countermeasures.

The attractiveness of wireless Networks is a testament mainly to their convenience? cost effectiveness? and alleviate of integration with other systems and mesh components. The most of computers traded to buyers today arrive pre-equipped with all essential wireless Networks technology. The advantages of wireless Networks include: Convenience? Mobility? Productivity? Deployment? Expandability and Cost.

Wireless Network expertise? while replete with the conveniences and benefits recounted overhead has its share of downfalls. For a granted networking position? wireless Networks may not be attractive for a number of reasons. Most of these have to do with the inherent limitations of the technology. The handicaps of utilising a wireless mesh are:

Security? Range? Reliability? and Speed.

Wireless Networks present an owner of matters for mesh managers. Unauthorized get access to points? broadcasted SSIDs? unidentified positions? and spoofed MAC locations are just a couple of the difficulties addressed in WLAN troubleshooting. Most mesh investigation vendors? for example Network Instruments? Network General? and Fluke? offer WLAN troubleshooting devices or functionalities as part of their merchandise line.

 

Wireless Vulnerabilities? Threats and Countermeasures

The wireless systems comprise of four rudimentary components: The transmission of facts and numbers utilising wireless frequencies; Access points that supply an attachment to the organizational mesh and/or the Client apparatus (laptops? PDAs? etc.); and ...
Related Ads