More on Wireless networking security



Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are “acceptable” levels of security depending on your circumstance. In other words, if you’re miles from nowhere and feel comfortable with WEP (which is breakable) fine.



I think the reall point is we need to be AWARE of the fact that radio frequency signals can be intercepted. MAC filtering can be spoofed, WEP can be cracked in 5-10 minutes, WPA can be brute forced and turning off the SSID broadcast only keeps the AP from advertising it’s presense, it can still be found.

Seriously, I don’t think there will ever be an “unbreakable” encryption of data. The catch is usually, is it too much of a pain to break to make it worthwhile. If it takes 3 years of computing time to break a code, your average script-kiddy isn’t going to bother trying to access your home wireless access point. If it takes 3 minutes, that’s another story.

It’s just like physical locks and physical security to buildings. If you lock a door there are ways to pick it, or to break down the door, if you get more expensive locks and stronger doors, people will look towards other ways to get in. (“Pizza delivery….”)

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 7 - Wireless Networking OK - the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting......
  • Wireless ethernet security Flexbeta has an article giving a good primer on the different approaches to wireless security that are currently available and what seems to be on track for the next generation of wireless networking. One thing that is worth noting, if it's transmitted through the air it can be intercepted. Breaking......
  • Network Security guide for the home or small business network - Part 1 - A Hardware firewall Computers can communicate over networks. (Surprise!) That's how you're reading this post. The machine that this site is hosted on is listening for requests for connection. When it receives a request it answers back with a web page. In fact, computers can listen for a great many different kinds of......
Blog Traffic Exchange Related Websites
  • Taking Care of Rare Coins Rare coins can be an incredibly important part of any coin collection, as they provide interest, intrigue, and pride to the collection itself. Some people will only have a few of these coins in their collection, while others will have a wealth of these coins. Whether you have one rare......
  • CWSP - Certified Wireless Security Professional The CWSP exam is an advanced level wireless LAN certification developed by Planet3 Wireless. This exam is a part of the Certified Wireless Network Program (CWNP). The exam tests your ability on how well you are able to protect your company’s valuable data from hackers. For anyone desiring a career......
  • FCC Approves the use of “White Space”, What is the Security Concern? On September 23rd of 2010 the FCC approved the usage of “White Space” for wireless networking access.  White Space is the frequency that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals. Supporters of “White Space” plan to......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site