May 31, 2012

Wireless Security

This week I was in a moral dilemma;we have just moved in to the new house and haven’t yet got a phone line or broadband connection. Writing and sending my Click article does require a certain amount of Internet access and so resigned myself to travelling back to the office at ten o’clock on this Tuesday evening unless someone out there was kind enough to be broadcasting a wireless signal that I could hitch on to.
Whilst I theoretically know how to crack a wireless network with minimal encryption,I decided that this could be considered a little un-neighbourly and so drew a line by saying I would only make a connection in the unlikely event that there was someone broadcasting with absolutely no security installed whatsoever. It turns out that what I assumed would
be an unlikely possibility was actually surprisingly obtainable;as I sat in my conservatory I quickly picked up a dozen wireless Internet connections with three of them being completely unprotected.
Instantly I knew what I would be writing my article on this week;if you consider that within a very tight radius of my conservatory there were three unprotected connections I dread to think how many thousands exist in Torbay. Whilst I was able to send this article as a result of their oversight,the situation could have been a lot more serious if I’d have had malicious intentions in mind.
Wireless technology is currently treading a fine line;the technology inherently needs to be secure since the signal is usually broadcast well beyond the four walls of the property that the network is designed to serve,however they are also designed to be used by computer users with only a very basic working knowledge. Since security and usability don’t go hand in hand,the former is usually discarded in favour of the latter. It is reasoned by the manufacturers that whilst Joe Public probably doesn’t have anything they particularly care to hide from the world,they would be rather irate if they couldn’t get their wireless network set up without assistance within 10 minutes of removing the router from the box.
The reality is that whether or not you have something to hide from the world,you don’t want anyone with a wireless card in a 100 metre radius having access to your network. If we put aside the most serious possibility of someone obtaining confidential information from your compromised network there is also the fact they may simply abuse your Internet connection. Every couple of weeks I speak to a new person who wants a wireless network card so they can access their neighbours’ Internet connection for free;even if they only use it for simple tasks it will affect the speed of their network as well as counting towards any usage limit if on a metered connection. There is also the real possibility that if they use your connection for less savoury activities then it will have the IP address associated with your Internet account stamped all over it.
Fortunately securing your network is a simple process that shouldn’t take more than a few minutes. There are several methods of securing your network from the popular WEP (Wireless Encryption Protocol) and MAC filtering to the more recent and secure WPA standard. It is important to choose the right one as there are some serious security flaws in some of the standards so we will discuss the advantages and disadvantages to both next week.

http://www.computerarticles.co.uk/wireless-security-2/

0 komentar:

Post a Comment

Followers