More on Wireless networking security



Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are “acceptable” levels of security depending on your circumstance. In other words, if you’re miles from nowhere and feel comfortable with WEP (which is breakable) fine.



I think the reall point is we need to be AWARE of the fact that radio frequency signals can be intercepted. MAC filtering can be spoofed, WEP can be cracked in 5-10 minutes, WPA can be brute forced and turning off the SSID broadcast only keeps the AP from advertising it’s presense, it can still be found.

Seriously, I don’t think there will ever be an “unbreakable” encryption of data. The catch is usually, is it too much of a pain to break to make it worthwhile. If it takes 3 years of computing time to break a code, your average script-kiddy isn’t going to bother trying to access your home wireless access point. If it takes 3 minutes, that’s another story.

It’s just like physical locks and physical security to buildings. If you lock a door there are ways to pick it, or to break down the door, if you get more expensive locks and stronger doors, people will look towards other ways to get in. (“Pizza delivery….”)

Related Posts

Blog Traffic Exchange Related Posts
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • Network Security guide for the home or small business network - Part 19 - What about when you're not on your home network? When you're not at your home network is probably one of those times you should be more on your guard. Wireless access points are very common and a greatly useful thing, but there are some steps you should take to protect yourself, your pc and the data stored there. First......
  • How to use wireless networking on a laptop This is one that I run into from time to time. Most laptops the last year or two (actually maybe a bit longer), have built in wireless networking. This is great and makes for easy access to wireless access points just about anywhere. In fact, most current operating systems (Windows......
Blog Traffic Exchange Related Websites
  • Feb Edition of Hackin9 - Network Security Another exciting edition of Hackin9 is out and you can download it here.  Information about this edition is located below: ·  Wuala – Secure Online Storage There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from......
  • Taking Care of Rare Coins Rare coins can be an incredibly important part of any coin collection, as they provide interest, intrigue, and pride to the collection itself. Some people will only have a few of these coins in their collection, while others will have a wealth of these coins. Whether you have one rare......
  • FCC Approves the use of “White Space”, What is the Security Concern? On September 23rd of 2010 the FCC approved the usage of “White Space” for wireless networking access.  White Space is the frequency that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals. Supporters of “White Space” plan to......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site