More on Wireless networking security



Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are “acceptable” levels of security depending on your circumstance. In other words, if you’re miles from nowhere and feel comfortable with WEP (which is breakable) fine.



I think the reall point is we need to be AWARE of the fact that radio frequency signals can be intercepted. MAC filtering can be spoofed, WEP can be cracked in 5-10 minutes, WPA can be brute forced and turning off the SSID broadcast only keeps the AP from advertising it’s presense, it can still be found.

Seriously, I don’t think there will ever be an “unbreakable” encryption of data. The catch is usually, is it too much of a pain to break to make it worthwhile. If it takes 3 years of computing time to break a code, your average script-kiddy isn’t going to bother trying to access your home wireless access point. If it takes 3 minutes, that’s another story.

It’s just like physical locks and physical security to buildings. If you lock a door there are ways to pick it, or to break down the door, if you get more expensive locks and stronger doors, people will look towards other ways to get in. (“Pizza delivery….”)

Related Posts

Blog Traffic Exchange Related Posts
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • Network Security guide for the home or small business network - Part 1 - A Hardware firewall Computers can communicate over networks. (Surprise!) That's how you're reading this post. The machine that this site is hosted on is listening for requests for connection. When it receives a request it answers back with a web page. In fact, computers can listen for a great many different kinds of......
  • How to use wireless networking on a laptop This is one that I run into from time to time. Most laptops the last year or two (actually maybe a bit longer), have built in wireless networking. This is great and makes for easy access to wireless access points just about anywhere. In fact, most current operating systems (Windows......
Blog Traffic Exchange Related Websites
  • Marketing is Dead - Long Live Marketing We are witnessing a new dawn in marketing; and nowhere is this truer than for small business. Old Marketing The old ways of marketing simply don’t work as well as they used to and now, new marketing methods work better than the old ones ever did. As a small......
  • Taking Care of Rare Coins Rare coins can be an incredibly important part of any coin collection, as they provide interest, intrigue, and pride to the collection itself. Some people will only have a few of these coins in their collection, while others will have a wealth of these coins. Whether you have one rare......
  • Feb Edition of Hackin9 - Network Security Another exciting edition of Hackin9 is out and you can download it here.  Information about this edition is located below: ·  Wuala – Secure Online Storage There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site