The topic of this research paper is Securing Wirless Lan/Wifi Network.
Introduction
WLAN boost the appeal of wireless networking. ASIDE FROM the obvious distinction of having no wires, wireless LANs or WLAN s have the same physical attributes as traditional networks and require the similar security considerations.
Literature Review/Explanation
Even though many may believe wireless systems are less secure than their wired counterparts (most IT professionals suffer nightmares of vulnerable data flying around the airwaves), WLAN s actually provide exclusive security elements at the physical layer that make them less susceptible than traditional LANs to a variety of safety risks.
Conclusion
The paper investigate the administration of wired networks know all too well how important it is to protect the physical wires of a network, lest an unauthorized individual gain access to sensitive company data.
Securing Wi-Fi Networks
Introduction
Wi-Fi networks,1 based on the IEEE 802.11b/g standards, have become very popular in recent years. Many users have installed Wi-Fi networks at home, and numerous corporations have added Wi-Fi access points to their wired networks, giving employees easier access to corporate data and services. The scenario in which an employee connects to the corporate network from a home network is of particular interest. Although IT personnel control Wi-Fi access points in the corporate network, they cannot control, and are not necessarily even aware of, access points in home networks. These networks have thus given hackers new opportunities to gain unauthorized access to corporate computer systems and their data. A review of the results of an investigation conducted to assess the security level in Wi-Fi networks in the city of Bergen, Norway, provides a context for analyzing some popular wireless security techniques and for offering suggestions on how to better protect these networks from hacking. (M.S. Gast, 20-76)
Explanation
Wireless hackers specialize in Wi-Fi networks and employ a number of techniques to locate local area network nodes or hotspots. For example, wardriving involves driving through an inhabited area and mapping houses and businesses with Wi-Fi networks, usually using software on a wireless-enabled laptop.
War-walking, or walk-by hacking, involves walking through a neighborhood with a Wi-Fi-enabled personal digital assistant. (M.S. Gast, 20-76)
PDA owners whose devices have a Wi-Fi client card can unintentionally war-walk if the operating system automatically connects the device to a Wi-Fi access point when the user passes by. A war-walker with mischievous designs may engage in war-chalking-marking special symbols on sidewalks or walls to indicate the security status of nearby Wi-Fi access points. Our study indicated that war-chalking does not seem to be a widespread phenomenon in Bergen. Wireless hackers pose a security threat because the encryption mechanism originally developed for Wi-Fi networks, known as Wired Equivalent Privacy, has been broken. In fact, it is possible to download programs to crack the encryption key on any WEP-encrypted link, as long as enough traffic is transmitted over the link. As the "Wireless Hacking Tools" sidebar illustrates, these programs are available for various platforms. (S. McClure, J. Scambray, and G. Kurtz, 72-87)