Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Security+ wireless network
Security+ wireless network
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Security+ wireless network
Wireless Connection Security Issues
Wireless connections are everywhere. They are used in homes, businesses, and on the go. The reasons for wireless connections' ubiquitousness are fairly obvious: convenience, mobility, and availability, just to name a few. Unfortunately, security is often overlooked when connecting wirelessly. There are several types of unauthorized access to a wireless network, and there are also many methods to gain this access.
Unauthorized access is not always due to malicious intent. For instance, a user may select the wireless connection of a neighboring business or home by accident. This is called an accidental association. The connection itself is referred to as a mis-association. It is possible this “mis-association” could be performed deliberately to bypass security measures (Gao, 2007).
Malicious association occurs when an attacker connects to a wireless network by making his or her wireless card look like a wireless access point (AP). This association can be exploited to gain access to information or to plant malicious software. The attacker may also be trying to gain access to a virtual private network (VPN) or bypass other security (Gao, 2007).
Occasionally, wireless network users may share a wireless connection. When this occurs, a guest computer connects to network through a computer that created an Ad-hoc or peer-to-peer network instead of the connecting to the wireless AP. This can be a security risk because sensitive corporate data may be obtained and malicious code can be transferred from one computer to the other.
One type of network security only allows computers with certain Media Access Control addresses (MAC addresses) to access the network. This is called MAC f...
... middle of paper ...
...nnot afford to become complacent. Maintaining equipment can easily fill a work day. But, wireless security also requires that users are properly trained, physical security is a priority, documentation is well maintained, and network connection logs are checked on a daily basis.
Works Cited
Avoiding Social Engineering and Phishing Attacks, US-Cert. Retrieved March 9, 2012 from
http://www.us-cert.gov/cas/tips/ST04-014.html
Gao, Jie (2007). Wireless LAN Security. Retrieved March 8, 2012 from www.cs.sunysb.edu/~jgao/CSE370-spring10/wlan-security.pdf
Johnson, Richard (n.d.). Wireless Security Vulnerabilities. Retrieved March 9, 2012 from
http://www.streetdirectory.com/travel_guide/2497/computers_and_the_internet/
wireless_security_vulnerabilities.html
Warchalking, Wikipedia. Retrieved March 10, 2012 from http://en.wikipedia.org/wiki/War_
chalking
Segmenting the wireless network from the wired network though, is not only a trust issue, wireless networks suffer from many attacks such as Denial of Service caused by interference. The access point that will provide wireless access will be connected to a wired switch, however the separation of the wireless network is proposed to be done with the use of virtual LANs. VLANs will separate the network to two logical networks operating on the same physical network. This separation will enchant network’s security as the main network will be inaccessible from customers as well as it will not be affected if the wireless network is facing issues. The AP must be using Wi-Fi Protected Access 2 (WPA2) security protocol that has advanced encryption standards comparing to
Following compliance guide line provided by NIST SP 800-16 that describes security and training requirements is another way to boost the awareness of the employees. These kind of training and follow of compliance emphasize on roles rather than fixed content providing flexibility, adaptability, and longevity. Furthermore varying method of training with respect to different users is also beneficial. For example training for general users, training for managerial users and training for technical users which can be categorized by job category or job functions.
It is a network security measure used in computer networks to ensure that the secure network physically protected from other unprotected networks. This
Backing up data, avoiding a single point of failure, and making sure data is only put where it needs to be are a few extra precautions to keeping your network secure [8].
Understanding a few areas where technology can be very beneficial is beneficial. Specifically, security measures or screening methods need to be reviewed. Since 9/11 many different areas have changed in the way airports conduct business. Security is always a serious concern and needs critical thinking. Airport security is not an area to lose focus on when it comes to security processes needed. One area needing some prevention and is a concern is the insider threat.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
An attacker wishing to disrupt a wireless network has a wide arsenal available to them. Many of these tools rely on using a faked MAC address, masquerading as an authorized wireless access point or as an authorized client. Using these tools, an attacker can launch denial of service attacks, bypass access control mechanisms, or falsely advertise services to wireless clients.
But there is always a way to tackle the wrong doers. We have a way to find them its called wifi positioning tool. Previously we were able to track the location based on ip and mac address that can only retrieve a wifi spot but cannot give us the access point of a particular device. This positioning tool can take us to a point from where particular user is accessing data over the internet. We also call it as a digital marauder’s map.
The protection of your network requires a level of network security. If you do not have security on your network, then you are capable of being hacked or receiving malware, spy, virus, and lots more. There are many programs or applications that can help detect and prevent strange activities on your computer, but there is also ways that you can help prevent anything from happening. Creating a password for your network is a good start toward protection of your computer. Try to make the password something only you would know, and maybe throw some numbers in there as well to maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves,...
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).
Wi-Fi facilitates ease of use and is getting increasingly popular with homes and businesses. Multiple Wi-Fi Access Points can be located in a given area. Wi-Fi security issues continue to be a problem, as the number of Access Points grows.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
Wireless technology has come from the basics of cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with technology forever revitalizing. Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing wireless Internet at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly via a router.
Don't use default settings, obvious passwords or keys. Rotate your WEP keys oftenat least once per day or every 10,000 packets of information to foil hackers' efforts. Finally, monitor, monitor, monitor! Do not just turn your network on and assume it will always stay the same. Check and sniff your own network for APs you don't know about.
The network management plan and security plan is important to help the company figure out how they will improve its network and security procedures for the company. Planning involves outlining objectiv...