Wireless networks are very common, both for organisations and
individuals. Many laptop computers have wireless cards pre-installed for
the buyer. The ability to enter a network while mobile has great
benefits. However, wireless networking has many security issues.
Crackers have found wireless networks relatively easy to break into, and
even use wireless technology to crack into non-wireless networks.
Network administrators must be aware of these risks, and stay up-to-date
on any new risks that arise. Also, users of wireless equipment must be
aware of these risks, so as to take personal protective measures.
(a) Home Wireless Threats
The need to secure traditional wired Internet connections was felt long
before. However, there is a growing trend of shifting to a wireless
connection at homes. This involves a process where the user connects a
device to his DSL or cable modem that broadcasts the Internet connection
through the air over a radio signal to his computer. If traditional
wired connections are susceptible to security tribulations, there is a
great risk of security breach that may arise when a user opens his
Internet connection to the airwaves. An unsecured wireless network
coupled with unsecured file sharing can be disastrous. There are,
however, steps one can take to protect the wireless network. The
following are some of the possible security steps:
(i) Make the wireless network invisible by disabling identifier broadcasting,
(ii) Rename the wireless network and change the default name.
(iii) Encrypt the network traffic,
(iv) Change administrator’s password from the default password. If the
wireless network does not have a default password, create one and use it
to protect the network,
(v) Use file sharing with caution. If the user does not need to share
directories and files over his network, he should disable file sharing
on his computers.
(vi) Keep the access point[6] software patched and up to date,
(vii) Check internet provider’s wireless security options as it may
provide information about securing your home wireless network,
(viii) Do not auto-connect to open Wi-Fi (wireless fidelity) networks
(ix) Turn off the network during extended periods of non-use, etc.
(b) Public Wireless Threats
The risks to users of wireless technology have increased exponentially
as the service has become more popular. There were relatively few
dangers when wireless techonology was first introduced. Currently,
however; there are a great number of security risks associated with
wireless technology. Some issues are obvious and some are not. At a
corporate level, it is the responsibility of the Information Technology
(IT) department to keep up to date with the types of threats and
appropriate counter measures to deploy. Security threats are growing in
the wireless arena. Crackers have learned that there is much
vulnerability in the current wireless protocols, encryption methods, and
in the carelessness and ignorance that exists at the user and corporate
IT level. Cracking methods have become much more sophisticated and
innovative with wireless. Cracking has become much easier and more
accessible with easy-to-use Windows-based and Linux-based tools being
made available on the web at no charge. IT personnel should be somewhat
familiar with what these tools can do and how to counteract the cracking
that stems from them.[7]Accessing the internet via a public wireless
access point involves serious security threats. These threats are
compounded by the inability to control the security setup of the
wireless network. The following steps can be taken to protect oneself at
public places:
(a) Be careful while dealing in an online environment if the network is
not properly secured. Avoid online banking, shopping, entering credit
card details, etc,
(b) Connect using a virtual private network (VPN) as it allows
connecting securely. VPNs encrypt connections at the sending and
receiving ends, and keep out traffic that is not properly encrypted,
(c) Disable file sharing in public wireless spaces as it is more dangerous than it is on your home wireless network,
(d) Be aware of your surroundings while using a public wireless access
point. If an internet connection is not essential, disable wireless
networking altogether.
III. Corporate security
The network of companies are equally vulnerable to various cyber attacks
and if not properly secured may cost the company tremendous loss of
information and money. The following are the types of unauthorised
access generally found at companies networks:
(a) Accidental Association: Unauthorised access to company wireless and
wired networks can come from a number of different methods and intents.
One of these methods is referred to as “accidental association”. This is
when a user turns on their computer and it latches on to a wireless
access point from a neighboring company’s overlapping network. The user
may not even know that this has occurred. However, this is a security
breach in that proprietary company information is exposed and now there
could exist a link from one company to the other. This is especially
true if the laptop is also hooked to a wired network.
(b) Malicious Association: “Malicious associations” are when wireless
devices can be actively made by crackers to connect to a company network
through their cracking laptop instead of a company access point (AP).
These types of laptops are known as “soft APs” and are created when a
cracker runs some software that makes his/her wireless network card look
like a legitimate access point. Once the cracker has gained access,
he/she can steal passwords, launch attacks on the wired network, or
plant trojans.
(c) Ad-Hoc Networks: Ad-hoc networks[8] can pose a security threat.
Ad-hoc networks are defined as peer to peer networks between wireless
computers that do not have an access point in between them. While these
types of networks usually have little security, encryption methods can
be used to provide security.
(d) Non-Traditional Networks: Non-traditional networks such as personal
network Bluetooth devices are not safe from cracking and should be
regarded as a security risk. Even bar code scanners, handheld PDAs,[9]
and wireless printers and copiers should be secured. These
non-traditional networks can be easily overlooked by IT personnel that
have narrowly focused on laptops.
(e) Identity Theft (MAC Spoofing): Identity theft occurs when a cracker
is able to listen in on network traffic and identify the MAC[10] address
of a computer with network privileges. Most wireless systems allow some
kind of MAC filtering to only allow authorised computers with specific
MAC IDs to gain access and utilize the network. However, a number of
programs exist that have network “sniffing” capabilities. Combine these
programs with capabilities. Combine these programs with other software that allow a
computer to pretend it has any MAC address that the cracker desires, and
the cracker can easily get around that hurdle.
(f) Man-In-The-Middle Attacks: A man-in-the-middle attack is one of the
more sophisticated attacks that have been cleverly thought up by
crackers. This attack revolves around the attacker enticing computers to
log into his/her computer which is set up as a soft AP. Once this is
done, the cracker connects to a real access point through another
wireless card offering a steady flow of traffic through the transparent
cracking computer to the real network. The cracker can then sniff the
traffic for user names, passwords, credit card numbers...etc. One type
of man-in-the-middle attack relies on security faults in challenge and
handshake protocols. It is called a “de-authentication attack”. This
attack forces AP-connected computers to drop their connections and
reconnect with the cracker’s soft AP. Man-in-the-middle attacks are
getting easier to pull off due to freeware such as LANjack and AirJack
automating multiple steps of the process. What was once done by cutting
edge crackers can now be done by less knowledgeable and skilled crackers
sitting around public and private hotspots.[11] Hotspots are
particularly vulnerable to any attack since there is little to no
security on these networks.
(g) Denial of Service: A Denial-of-service attack occurs when an
attacker continually bombards a targeted AP or network with bogus
requests, premature successful connection messages, failure messages,
and/or other commands. These cause legitimate users to not be able to
get on the network and may even cause the network to crash. These
attacks rely on the abuse of protocols such as the Extensible
Authentication Protocol (EAP).
(h) Network Injection: The final attack to be covered is the network
injection attack. A cracker can make use of AP points that are exposed
to non-filtered network traffic. The cracker injects bogus networking
re-configuration commands that affect routers, switches, and intelligent
hubs. A whole network can be brought down in this manner and require
rebooting or even reprogramming of all intelligent networking devices.
Why wireless networks are more susceptible to security problems
1:56 AM
27 comments
Subscribe to:
Post Comments (Atom)
This comment has been removed by the author.
ReplyDeleteSecurity testing is must. Everybody wants security at every level of his working. as explained above failures are happened but if we test time to time then it will improve. So it depend on us how much we are serious about this.
DeleteA Unified QoS and Security Provisioning Framework for Wiretap Cognitive Radio Networks A Statistical Queueing Analysis Approach Project For CSE
Determining the Optimal Random Padding Size for Rabin Crypto systems Project For CSE
Development and Analysis of Deterministic Privacy Preserving Policies Using Non Stochastic Information Theory Project For CSE
Embedding Covert Information in Broadcast Communications Project For CSE
JCS Net Joint Classification and Super Resolution Network for Small scale Pedestrian Detection in Surveillance Images Project For CSE
This is because they work through radio waves which can be easily captured by most of the network adapters.
ReplyDeleteThanks
Silvester Norman
Change Mac Address
This comment has been removed by the author.
ReplyDeletesecure wi fi conection is everyone wants these days and these kind fo articel helps many to secure there networl and if you want more secure wi fi network you can visit
ReplyDeleteredes wifi
Great facts. Many thanks with regard to offering all of us such a beneficial facts. Maintain the great do the job as well as continue offering all of us far more quality facts every now and then. If at all possible, when you obtain ability, do you thoughts modernizing your blog along with additional information
ReplyDeleteWireless Internet Card
The change in the growth rate is a substantial development because just before the barbarian terrorist attacks in Mumbai that shook the whole country Childcare Security Services Sydney
ReplyDeleteBrilliant article you have covered all the points.I liked the various corporate security solutions you have discussed here.Thanks for sharing this information with us.I recommend you ti visit softexinc website to know more about corporate security.
ReplyDeleteGood Informative blog.You have discussed about various aspects of network security here.From Home security to corporate secuirty.I'm very grateful in reading this blog.
ReplyDeleteI would like to know more about these suggestive points. Give me little more brief and I think they can help me. Here the mentioned points are very useful and I am definitely going to adopt in my life.HPE OfficeConnect 1620
ReplyDeleteWhat is WiFi Security Risk KRACK What is WiFi Security Risk KRACK – We have run over with a security deformity known as KRACK which revealed the weakness in Wi-Fi Networks far and wide. The imperfection attack has been viable against all devices yet prominently against Android ones. The KRACK impacts the WPA2 Protocol available in Wi-Fi Security part.
ReplyDeleteBut what if we talking about VPN, is that still the same?
ReplyDeleteFor sure it is, check up with these bestvpnrating.cоm
ReplyDeleteNetwork security and network protection is an association's technique that empowers ensuring the security of its benefits including all system traffic. It incorporates both programming and equipment innovations.
ReplyDeleteShare great information about your blog , Blog really helpful for us . We read your blog , share most useful information in blog . Thanks for share your blog here .
ReplyDeleteAPC Back UPS RS
It become an attractive part of a blog when author uses indirect speech while writing a blog. It shows your creative mind as well as make your written essay different from others.
ReplyDeleteHPE SimpliVity 380 Gen10
it is possible to detect whether an unauthorised person, other than the authorised employees is accessing the data.
ReplyDeleteSecurity Alarms in Moorabbin
Nice post... we are posting also wireless technology article visit here
ReplyDeleteShare great information about your blog , Blog really helpful for us . We read your blog , share most useful information in blog . Thanks for share your blog here .
ReplyDeleteQNAP TS X32XU Series
Hello, I also would like to comment over all the points mentioned in this blog. I agree with essence of few point but somewhere I found myself on other place. I hope, there might little opinion of others as well.
ReplyDeleteCISCO Cisco Meraki MR70
Story of this blog is well written. The writer kept in consideration the grammar very well. Level of English also very well. Lot many new words has been used while writing content of this blog.
ReplyDeleteSuperServer 7049P TR
IMPRESSED WITH SUCH A GOOD CONTENT!!
ReplyDeleteVERY INTERESTING
GREAT WORK
wireless network solutions in dubai
THANKS FOR SHARING SUCH A GREAT WORK
ReplyDeleteGOOD CONTENT!!
data network in dubai
ReplyDeletethank u for sharing this post Meraki Wireless AP
CISCO Wireless Access Points
Why Wireless Networks Are More Susceptible To Security Problems ~ Wireless Network Security >>>>> Download Now
ReplyDelete>>>>> Download Full
Why Wireless Networks Are More Susceptible To Security Problems ~ Wireless Network Security >>>>> Download LINK
>>>>> Download Now
Why Wireless Networks Are More Susceptible To Security Problems ~ Wireless Network Security >>>>> Download Full
>>>>> Download LINK
Why Wireless Networks Are More Susceptible To Security Problems ~ Wireless Network Security >>>>> Download Now
ReplyDelete>>>>> Download Full
Why Wireless Networks Are More Susceptible To Security Problems ~ Wireless Network Security >>>>> Download LINK
>>>>> Download Now
Why Wireless Networks Are More Susceptible To Security Problems ~ Wireless Network Security >>>>> Download Full
>>>>> Download LINK kc
Welcome to ICorp Security - Our mission is to provide and develop Melbourne's highest-performing security services. Keep close track of our personnel, valued clients, and expert services to see how we can bring you the best and most comfortable experience, to protect you, your clientele, and your assets.
ReplyDelete