More on Wireless networking security



Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are “acceptable” levels of security depending on your circumstance. In other words, if you’re miles from nowhere and feel comfortable with WEP (which is breakable) fine.



I think the reall point is we need to be AWARE of the fact that radio frequency signals can be intercepted. MAC filtering can be spoofed, WEP can be cracked in 5-10 minutes, WPA can be brute forced and turning off the SSID broadcast only keeps the AP from advertising it’s presense, it can still be found.

Seriously, I don’t think there will ever be an “unbreakable” encryption of data. The catch is usually, is it too much of a pain to break to make it worthwhile. If it takes 3 years of computing time to break a code, your average script-kiddy isn’t going to bother trying to access your home wireless access point. If it takes 3 minutes, that’s another story.

It’s just like physical locks and physical security to buildings. If you lock a door there are ways to pick it, or to break down the door, if you get more expensive locks and stronger doors, people will look towards other ways to get in. (“Pizza delivery….”)

Related Posts

Blog Traffic Exchange Related Posts
  • How to use wireless networking on a laptop This is one that I run into from time to time. Most laptops the last year or two (actually maybe a bit longer), have built in wireless networking. This is great and makes for easy access to wireless access points just about anywhere. In fact, most current operating systems (Windows......
  • Wireless ethernet security Flexbeta has an article giving a good primer on the different approaches to wireless security that are currently available and what seems to be on track for the next generation of wireless networking. One thing that is worth noting, if it's transmitted through the air it can be intercepted. Breaking......
  • Using ssh to protect web browsing over wireless or other hostile networks This really could be used to encyrpt web traffic over any "hostile" network. Here's what I'm talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world......
Blog Traffic Exchange Related Websites
  • Antique Door Locks Antiques -> Architectural & Garden -> Doors The look of antique furniture and hardware can lend such old-fashioned charm to a room, so it's no wonder than an antique door lock is a popular item that can look great in all but the most modern décor. Someone searching for this......
  • Taking Care of Rare Coins Rare coins can be an incredibly important part of any coin collection, as they provide interest, intrigue, and pride to the collection itself. Some people will only have a few of these coins in their collection, while others will have a wealth of these coins. Whether you have one rare......
  • FCC Approves the use of “White Space”, What is the Security Concern? On September 23rd of 2010 the FCC approved the usage of “White Space” for wireless networking access.  White Space is the frequency that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals. Supporters of “White Space” plan to......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site