[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Beginners Guides: Securing A Wireless Network
Beginners Guides: Securing A Wireless Network - PCSTATS
Modern wireless networking products are inexpensive, simple to set up and very convenient. They are also full of holes... security holes, that is.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Jul 30 2007   M. Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Beginners Guides: Securing A Wireless Network

Securing a wireless network is as important as locking the passenger door on your car when you leave it in the parking garage. - Version 1.3.0

Modern wireless networking products are inexpensive, simple to set up and very convenient. They are also full of holes... security holes, that is.

The reason for this can be traced to the popularity of wireless. Wireless networking is firmly entrenched in the home computer market, and that means that the people buying the products cannot be assumed to have any form of expertise in IT; hence, the products had better be extremely easy to set up, and use.

Ease of use and security tend to be mutually exclusive. So for wireless manufacturers, the reasoning goes that while the average Joe or Jane Smith at home has nothing they'd really care to hide from the world, or that the world would really care to find out about them, they will get very peeved if they cannot get their new wireless router up and running quickly and without help.

Unfortunately, the only way to make a complicated appliance like a wireless router idiot proof is to use default settings that will not require the user to change a single settings on any of their other wireless hardware. By extension, this means that any wireless device can connect to said router using default settings.

To repeat, this means that ANY wireless device in range can connect to the Smith's new router. Now, if you are Joe Smith, do you have anything you'd like to hide?

Tools that can discover wireless networks
- Netstumbler
- Kismet
Linux-based tools/info for cracking WEP Encryption
- Airsnort
- WEPcrack
- Wepattack
Tools that can capture wireless packets
- LinkFerret
- Etheral
- Kismet
There are a couple of reasons why wireless networks are currently less secure than their wired counterparts. First off, there is the fact of their physical nature. They are wireless, broadcasting a signal out over an area. Any computer within this area with the correct equipment can be considered to be 'connected' to the network.

No wires equal easier access to the network for everyone. This also makes one of the most popular 'hacking' tactics vastly easier: 'packet sniffing,' or capturing data sent over the network to analyze it for information. Anyone in range can receive all traffic sent over the wireless network.

Secondly, current security methods for the most widely available wireless technology, 802.11b, are either easy to defeat or difficult to implement.

The two most common methods of securing 802.11b networks are WEP (wireless encryption protocol) and MAC address filtering. WEP (64-bit, or 128-bit) protects wireless traffic by using a key to encrypt data, shared between all computers that need access. WPA (WiFi protected access) which is just now emerging, address all of WEPs shortcomings, and so we'll touch on that a little later on in the guide.

Unfortunately, WEP is rather easy to crack with the correct (and freely available) software, and its wireless nature makes it easy for intruders to capture enough of your encrypted traffic to give the cracking software something to work with.

© 2023 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >


Contents of Article: PCSTATS
 Pg 1.  — Beginners Guides: Securing A Wireless Network
 Pg 2.  Network Security vs. Wireless Security
 Pg 3.  Finding Intruders on a Network
 Pg 4.  Checking Ports and Workgroups
 Pg 5.  Checking Router Logs
 Pg 6.  Managing Network Shares
 Pg 7.  Personal Firewalls
 Pg 8.  Using Zonealarm
 Pg 9.  Securing a Router and Wireless Connection
 Pg 10.  More Steps to Securing a WLAN
 Pg 11.  Disabling DHCP on a WAP
 Pg 12.  Wireless Protected Access: WEP Improved

Hardware Sections 

PCSTATS Network Features Information About Us Contact
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2023 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.