4
7/23/2019 ARTICLE Wireless Security http://slidepdf.com/reader/full/article-wireless-security 1/4 Wireless security Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi!i Protected "ccess (WP"). WEP is a notoriously weak security standard. The password it uses can often #e cracked in a few minutes with a #asic laptop computer and widely availa#le software tools. WEP is an old $EEE %&'. standard from * which was outdated in '&&+ #y WP"* or Wi!i Protected "ccess. WP" was a quick alternative to improve security over WEP. The current standard is WP"', some hardware cannot support WP"' without firmware upgrade or replacement. WP"' uses an encryption device that encrypts the network with a '-#it key, the longer key length improves security over WEP. /any laptop computers have wireless cards preinstalled. The a#ility to enter a network while mo#ile has great #enefits. 0owever* wireless networking is prone to some security issues. 0ackers have found wireless networks relatively easy to #reak into* and even use wireless technology to hack into wired networks. "s a result* it is very important that enterprises define effective wireless security  policies that guard against unauthorized access to important resources. Wireless $ntrusion Prevention 1ystems (W$P1) or Wireless $ntrusion 2etection 1ystems (W$21) are commonly used to enforce wireless security policies. The risks to users of wireless technology have increased as the service has #ecome more  popular. There were relatively few dangers when wireless technology was first introduced. 0ackers had not yet had time to latch on to the new technology* and wireless networks were not commonly found in the work place. 0owever* there are many security risks associated with the current wireless  protocols and encryption methods* and in the carelessness and ignorance that e3ists at the user and corporate $T level. 0acking methods have #ecome much more sophisticated and innovative with

ARTICLE Wireless Security

  • Upload
    nagu

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ARTICLE Wireless Security

7/23/2019 ARTICLE Wireless Security

http://slidepdf.com/reader/full/article-wireless-security 1/4

Wireless security

Wireless security is the prevention of unauthorized access or damage to computers

using wireless networks. The most common types of wireless security are Wired Equivalent

Privacy (WEP) and Wi!i Protected "ccess (WP"). WEP is a notoriously weak security standard.

The password it uses can often #e cracked in a few minutes with a #asic laptop computer and widely

availa#le software tools. WEP is an old $EEE %&'. standard from * which was outdated in

'&&+ #y WP"* or Wi!i Protected "ccess. WP" was a quick alternative to improve security over 

WEP. The current standard is WP"', some hardware cannot support WP"' without firmware

upgrade or replacement. WP"' uses an encryption device that encrypts the network with a '-#it

key, the longer key length improves security over WEP.

/any laptop computers have wireless cards preinstalled. The a#ility to enter a network while mo#ile

has great #enefits. 0owever* wireless networking is prone to some security issues. 0ackers have

found wireless networks relatively easy to #reak into* and even use wireless technology to hack into

wired networks. "s a result* it is very important that enterprises define effective wireless security

 policies that guard against unauthorized access to important resources. Wireless $ntrusion Prevention

1ystems (W$P1) or Wireless $ntrusion 2etection 1ystems (W$21) are commonly used to enforce

wireless security policies.

The risks to users of wireless technology have increased as the service has #ecome more

 popular. There were relatively few dangers when wireless technology was first introduced. 0ackers

had not yet had time to latch on to the new technology* and wireless networks were not commonly

found in the work place. 0owever* there are many security risks associated with the current wireless

 protocols and encryption methods* and in the carelessness and ignorance that e3ists at the user and

corporate $T level. 0acking methods have #ecome much more sophisticated and innovative with

Page 2: ARTICLE Wireless Security

7/23/2019 ARTICLE Wireless Security

http://slidepdf.com/reader/full/article-wireless-security 2/4

wireless access. 0acking has also #ecome much easier and more accessi#le with easyto

use Windows or 4inu3#ased tools #eing made availa#le on the we# at no charge.

1ome organizations that have no wireless access points installed do not feel that they need to address

wireless security concerns. $n1tat /25 and /ET" 6roup have estimated that -7 of all corporate

laptop computers that were planned to #e purchased in '&&- were equipped with wireless cards.

$ssues can arise in a supposedly nonwireless organization when a wireless laptop is plugged into the

corporate network. " hacker could sit out in the parking lot and gather information from it through

laptops and8or other devices* or even #reak in through this wireless card9equipped laptop and gain

access to the wired network.

0ow 2oes $t Work:

/c"fee Wireless 0ome ;etwork 1ecurity locks down your wireless router8"P and secures the data

that is sent over Wi!i. $t does this #y generating a long* strong* random wireless security shared key*

and distri#uting this key securely to each wireless device in your network.

The steps the software performs to secure your wireless network and data are<

. Wireless 5outer8"P 4ockdown 9 The software automatically configures the wireless router8"P

with the strong wireless security key and the wireless network is protected. 0ackers cannot

connect to the protected wireless network.

'. 1ecure =onnection Esta#lished 9 The first P= gains a secure connection to the wireless

router8"P. The data transmitted over this secure connection is strongly encrypted. >ther P=s can

 ?oin the protected network with one click with permission from any of the connected P=s.

Page 3: ARTICLE Wireless Security

7/23/2019 ARTICLE Wireless Security

http://slidepdf.com/reader/full/article-wireless-security 3/4

+. Wireless 1ecurity @eys 5otated 9 The wireless security keys are frequently rotated thwarting

even the most determined hackers.

2ata

1ecurity and privacy in wireless #ody area networks

The wireless #ody area network has emerged as a new technology for ehealthcare that

allows the data of a patientAs vital #ody parameters and movements to #e collected #y small weara#le

or implanta#le sensors and communicated using shortrange wireless communication techniques.

WB"; has shown great potential in improving healthcare quality* and thus has found a wide range

of applications from u#iquitous health monitoring and computer assisted reha#ilitation to emergency

medical response systems. The security and privacy protection of the data collected from a WB";*

either while stored inside the WB"; or during their transmission outside of the WB";* is a ma?or 

Page 4: ARTICLE Wireless Security

7/23/2019 ARTICLE Wireless Security

http://slidepdf.com/reader/full/article-wireless-security 4/4

unsolved concern* with challenges coming from stringent resource constraints of WB"; devices*

and the high demand for #oth security8privacy and practicality8usa#ility.

" highly 1ecure Wireless ;etwork<

"n article #y<  Prof. @haleel 2.T