Wireless Network Security
Posted by Slamet | Posted in network | Posted on 11.02
Wireless Network Security Easier On Crack Compared to Cable Network Security
Security could be the last thing you think in your effort to build a wireless network whether at home or office. You do not realize that so many people around you spend time trying to steal people's private files, steal credit card data on the Internet, even if in many office employees are also fun to spend time trying to see see other people's personal data in the form of files, photo , or even email if they can be an opportunity for it. Surely you do not want to leave your computer or laptop without a certain protection and security are not?
As a general statement, you must provide a system of adequate level of security and sensitivity levels comparable to the data you're protecting. Unlike a LAN cable system, which is physically secure, wireless networks can not only be limited by the walls inside the building. Wireless networks can penetrate your wall of the building, and depending on how good the quality of your wireless network coverage, wireless coverage can be an extent of about 300 meters outside the building using only the labtop and the antenna amplifier. This makes wireless networks are highly vulnerable and vulnerable to all kinds of businesses and robbery interception of your data. Just as in the LAN network cable, wireless networks are also vulnerable to all kinds of threats and network disturbances such as DoS, Spamming, etc. Sniffers.
There are several reasons for which you require to protect your computer from all forms of network threats are:
1. Personal and financial data you or your medical history data on your hard disk your computer or laptop
2. Your Internet connection is not cheap, of course you do not want to share with all who are not entitled to, instead of really cheap, but the effect of a vulnerable system could cause us harm.
3. You do not want anyone else to use your computer to be used to spread spam from your computer or from your email address.
Wireless network security is basically easier to crack than a LAN cable, because you do not actually require a physical connection to the wireless network. Data transfer occurs through the air waves, which is therefore easier pengaksesannya so. Therefore, a systematic approach in wireless network security, including protection against virus attacks is a must.
Service Set ID (SSID)
Service Set ID (SSID) is a string or a name that is used to define a domain roaming in an access point (AP) in a wireless network consisting of many Access Points (APs). A different SSID on the access point and some may enable a wireless network network overlap. This SSID initially regarded as a password to enter into a wireless network, without the SSID the client will not be able to connect to the network. However, this was rejected because klain Access Point SSID to broadcast several times per second and all sorts of analytical tools such as the 802.11 standard Airmagnet, NetStumbler, or Wildpacket Airopeek can be used to read it. Because users often configure clients, what is called these passwords become widely known often. So if we use this SSID as a password so no good.
Should we change this SSID? Obviously must. Although the SSID is not is one layer of system security, SSID name should be changed from the default name of the factory built so that people do not guess your wireless network with ease.
Inkripsi wireless network
Almost all wireless routers and wireless adapters now support wireless networking security standards like WEP and WPA encryption 64-bit/128-bit. What does it mean it WEP or WPA?
Security in wireless networks, WAP stands for Wi-Fi Protected Access (WPA or WPA2 latest version) which is a program created by certifikasi Wi-Fi Alliance, which indicates the existence of a compliant (subject to a rule or standard prescribed) with the security protocol created by the Wi-Fi Alliance for wireless computer network security. This protocol was created to answer a lot of discovery (by researchers) system weaknesses predecessor wireless security standard is WEP (Wired Equivalent Privacy).
Wired Equivalent Privacy (WEP) in wireless network security is a particular algorithm that was created for the security of IEEE 802.11 wireless networks. wireless network to broadcast messages using radio signals, hence very vulnerable to any attempt at "pengupingan" LAN network than a cable. When introduced in 1977, WEP is intended to provide confidentiality comparable to traditional wired networks.
Certifikasi signs on WPA2 wireless network security and demonstrate a compliant with an advanced protocol to implement the full standard. This advanced level protocol will not run or does not support the wireless adapter device earlier version (ancient). Who pass the test product testing by the Wi-Fi Alliance for a compliant with this protocol entitled to WPA on the product label.
WPA2 replaces WPA, such as WPA, WPA2 requires testing and certifikasi by Wi-Fi Alliance. Implement WPA2-2 mandatory elements of 802.11i. Specifically it introduces a new algorithm based on AES, CCMP, which is considered very safe. Certifikasi started in September 2004 and since March 13, 2006, certifikasi WPA2 is a must for all new wireless devices if you want to get Wi-Fi label.
IEEE 802.11i-2004, or 802.11i security in wireless networks is an amendment to the IEEE 802.11 standard is to specify the wireless network security mechanisms.
He replaced the short clause "Authentication and privacy" of the original standard of the clause detailed "security", in the process of depreciation WEP leakage. This amendment and legalized into the published standard IEEE 802.11-2007 standard.
Now we've had a little pegetahuan about wireless networking security standards, where almost all producen wireless WPA/WPA2 compliant label on the product of their wireless devices.
Almost all wireless devices on the router from the factory default set to not provide security (disable security), so you should be setting it to enable the standard security. If you do not want to use wireless security, then you just let the factory default settings. It is very surprising that almost most people do not use the security features of this wireless network and let the original default settings, for some reason is not practical to reason does not know how to do security settings. This habit led to a hobby of some people around for the wireless signal with their laptop or a PDA or Blackberry devices equipped with Wi-Fi. But more dangerous are some people who are trying to find a gap to get into wireless networks to steal data or harmful hacking attempt your company.
source : www.sysneta.com
Security could be the last thing you think in your effort to build a wireless network whether at home or office. You do not realize that so many people around you spend time trying to steal people's private files, steal credit card data on the Internet, even if in many office employees are also fun to spend time trying to see see other people's personal data in the form of files, photo , or even email if they can be an opportunity for it. Surely you do not want to leave your computer or laptop without a certain protection and security are not?
As a general statement, you must provide a system of adequate level of security and sensitivity levels comparable to the data you're protecting. Unlike a LAN cable system, which is physically secure, wireless networks can not only be limited by the walls inside the building. Wireless networks can penetrate your wall of the building, and depending on how good the quality of your wireless network coverage, wireless coverage can be an extent of about 300 meters outside the building using only the labtop and the antenna amplifier. This makes wireless networks are highly vulnerable and vulnerable to all kinds of businesses and robbery interception of your data. Just as in the LAN network cable, wireless networks are also vulnerable to all kinds of threats and network disturbances such as DoS, Spamming, etc. Sniffers.
There are several reasons for which you require to protect your computer from all forms of network threats are:
1. Personal and financial data you or your medical history data on your hard disk your computer or laptop
2. Your Internet connection is not cheap, of course you do not want to share with all who are not entitled to, instead of really cheap, but the effect of a vulnerable system could cause us harm.
3. You do not want anyone else to use your computer to be used to spread spam from your computer or from your email address.
Wireless network security is basically easier to crack than a LAN cable, because you do not actually require a physical connection to the wireless network. Data transfer occurs through the air waves, which is therefore easier pengaksesannya so. Therefore, a systematic approach in wireless network security, including protection against virus attacks is a must.
Service Set ID (SSID)
Service Set ID (SSID) is a string or a name that is used to define a domain roaming in an access point (AP) in a wireless network consisting of many Access Points (APs). A different SSID on the access point and some may enable a wireless network network overlap. This SSID initially regarded as a password to enter into a wireless network, without the SSID the client will not be able to connect to the network. However, this was rejected because klain Access Point SSID to broadcast several times per second and all sorts of analytical tools such as the 802.11 standard Airmagnet, NetStumbler, or Wildpacket Airopeek can be used to read it. Because users often configure clients, what is called these passwords become widely known often. So if we use this SSID as a password so no good.
Should we change this SSID? Obviously must. Although the SSID is not is one layer of system security, SSID name should be changed from the default name of the factory built so that people do not guess your wireless network with ease.
Inkripsi wireless network
Almost all wireless routers and wireless adapters now support wireless networking security standards like WEP and WPA encryption 64-bit/128-bit. What does it mean it WEP or WPA?
Security in wireless networks, WAP stands for Wi-Fi Protected Access (WPA or WPA2 latest version) which is a program created by certifikasi Wi-Fi Alliance, which indicates the existence of a compliant (subject to a rule or standard prescribed) with the security protocol created by the Wi-Fi Alliance for wireless computer network security. This protocol was created to answer a lot of discovery (by researchers) system weaknesses predecessor wireless security standard is WEP (Wired Equivalent Privacy).
Wired Equivalent Privacy (WEP) in wireless network security is a particular algorithm that was created for the security of IEEE 802.11 wireless networks. wireless network to broadcast messages using radio signals, hence very vulnerable to any attempt at "pengupingan" LAN network than a cable. When introduced in 1977, WEP is intended to provide confidentiality comparable to traditional wired networks.
Certifikasi signs on WPA2 wireless network security and demonstrate a compliant with an advanced protocol to implement the full standard. This advanced level protocol will not run or does not support the wireless adapter device earlier version (ancient). Who pass the test product testing by the Wi-Fi Alliance for a compliant with this protocol entitled to WPA on the product label.
WPA2 replaces WPA, such as WPA, WPA2 requires testing and certifikasi by Wi-Fi Alliance. Implement WPA2-2 mandatory elements of 802.11i. Specifically it introduces a new algorithm based on AES, CCMP, which is considered very safe. Certifikasi started in September 2004 and since March 13, 2006, certifikasi WPA2 is a must for all new wireless devices if you want to get Wi-Fi label.
IEEE 802.11i-2004, or 802.11i security in wireless networks is an amendment to the IEEE 802.11 standard is to specify the wireless network security mechanisms.
He replaced the short clause "Authentication and privacy" of the original standard of the clause detailed "security", in the process of depreciation WEP leakage. This amendment and legalized into the published standard IEEE 802.11-2007 standard.
Now we've had a little pegetahuan about wireless networking security standards, where almost all producen wireless WPA/WPA2 compliant label on the product of their wireless devices.
Almost all wireless devices on the router from the factory default set to not provide security (disable security), so you should be setting it to enable the standard security. If you do not want to use wireless security, then you just let the factory default settings. It is very surprising that almost most people do not use the security features of this wireless network and let the original default settings, for some reason is not practical to reason does not know how to do security settings. This habit led to a hobby of some people around for the wireless signal with their laptop or a PDA or Blackberry devices equipped with Wi-Fi. But more dangerous are some people who are trying to find a gap to get into wireless networks to steal data or harmful hacking attempt your company.
source : www.sysneta.com
Comments (0)
Posting Komentar