Upload
nagu
View
217
Download
0
Embed Size (px)
Citation preview
7/23/2019 ARTICLE Wireless Security
http://slidepdf.com/reader/full/article-wireless-security 1/4
Wireless security
Wireless security is the prevention of unauthorized access or damage to computers
using wireless networks. The most common types of wireless security are Wired Equivalent
Privacy (WEP) and Wi!i Protected "ccess (WP"). WEP is a notoriously weak security standard.
The password it uses can often #e cracked in a few minutes with a #asic laptop computer and widely
availa#le software tools. WEP is an old $EEE %&'. standard from * which was outdated in
'&&+ #y WP"* or Wi!i Protected "ccess. WP" was a quick alternative to improve security over
WEP. The current standard is WP"', some hardware cannot support WP"' without firmware
upgrade or replacement. WP"' uses an encryption device that encrypts the network with a '-#it
key, the longer key length improves security over WEP.
/any laptop computers have wireless cards preinstalled. The a#ility to enter a network while mo#ile
has great #enefits. 0owever* wireless networking is prone to some security issues. 0ackers have
found wireless networks relatively easy to #reak into* and even use wireless technology to hack into
wired networks. "s a result* it is very important that enterprises define effective wireless security
policies that guard against unauthorized access to important resources. Wireless $ntrusion Prevention
1ystems (W$P1) or Wireless $ntrusion 2etection 1ystems (W$21) are commonly used to enforce
wireless security policies.
The risks to users of wireless technology have increased as the service has #ecome more
popular. There were relatively few dangers when wireless technology was first introduced. 0ackers
had not yet had time to latch on to the new technology* and wireless networks were not commonly
found in the work place. 0owever* there are many security risks associated with the current wireless
protocols and encryption methods* and in the carelessness and ignorance that e3ists at the user and
corporate $T level. 0acking methods have #ecome much more sophisticated and innovative with
7/23/2019 ARTICLE Wireless Security
http://slidepdf.com/reader/full/article-wireless-security 2/4
wireless access. 0acking has also #ecome much easier and more accessi#le with easyto
use Windows or 4inu3#ased tools #eing made availa#le on the we# at no charge.
1ome organizations that have no wireless access points installed do not feel that they need to address
wireless security concerns. $n1tat /25 and /ET" 6roup have estimated that -7 of all corporate
laptop computers that were planned to #e purchased in '&&- were equipped with wireless cards.
$ssues can arise in a supposedly nonwireless organization when a wireless laptop is plugged into the
corporate network. " hacker could sit out in the parking lot and gather information from it through
laptops and8or other devices* or even #reak in through this wireless card9equipped laptop and gain
access to the wired network.
0ow 2oes $t Work:
/c"fee Wireless 0ome ;etwork 1ecurity locks down your wireless router8"P and secures the data
that is sent over Wi!i. $t does this #y generating a long* strong* random wireless security shared key*
and distri#uting this key securely to each wireless device in your network.
The steps the software performs to secure your wireless network and data are<
. Wireless 5outer8"P 4ockdown 9 The software automatically configures the wireless router8"P
with the strong wireless security key and the wireless network is protected. 0ackers cannot
connect to the protected wireless network.
'. 1ecure =onnection Esta#lished 9 The first P= gains a secure connection to the wireless
router8"P. The data transmitted over this secure connection is strongly encrypted. >ther P=s can
?oin the protected network with one click with permission from any of the connected P=s.
7/23/2019 ARTICLE Wireless Security
http://slidepdf.com/reader/full/article-wireless-security 3/4
+. Wireless 1ecurity @eys 5otated 9 The wireless security keys are frequently rotated thwarting
even the most determined hackers.
2ata
1ecurity and privacy in wireless #ody area networks
The wireless #ody area network has emerged as a new technology for ehealthcare that
allows the data of a patientAs vital #ody parameters and movements to #e collected #y small weara#le
or implanta#le sensors and communicated using shortrange wireless communication techniques.
WB"; has shown great potential in improving healthcare quality* and thus has found a wide range
of applications from u#iquitous health monitoring and computer assisted reha#ilitation to emergency
medical response systems. The security and privacy protection of the data collected from a WB";*
either while stored inside the WB"; or during their transmission outside of the WB";* is a ma?or
7/23/2019 ARTICLE Wireless Security
http://slidepdf.com/reader/full/article-wireless-security 4/4
unsolved concern* with challenges coming from stringent resource constraints of WB"; devices*
and the high demand for #oth security8privacy and practicality8usa#ility.
" highly 1ecure Wireless ;etwork<
"n article #y< Prof. @haleel 2.T