Introduction to Information Security – Part 5

Info Sec cloud image - green_2

Wireless Security

In wireless systems (wireless), the air (radio) is used to transmit data rather than wires. The Wireless systems are less secure than wired systems secure because the data can be intercepted in transit and misused. To protect data, wireless controllers use the Service Set Identifiers (SSID), WEP and WAP.

SSID are identification numbers in the NICs to ensure safety. WAP is for use with mobile devices hows the PDAS and mobile phones. It works similar to TCP / IP and has the same purpose, but for wireless communications. WEP is a privacy protocol specified in IEEE 802.11 to provide secure communications for wireless LAN users.

Various wireless security protocols are designed to protect the wireless network. Among these protocols, as we have seen, include WEP, WPA and WPA2 (enhanced version of WPA), each with their strengths – and weaknesses. In addition to preventing unwanted guests connect to your wireless network, wireless security protocols encrypt your private data as it is being transmitted waves.

Wireless networks are inherently insecure’s. In the early days of wireless network use, manufacturers have tried to make it as easy as possible for end users. The out-of-the-box configuration provided the majority of wireless network equipment easy but insecure access the wireless network.

While many of these problems have been addressed, Wireless networks are generally unsecured as wired networks. Wired networks, mostly send data between two points, A and B, in which they are connected by a network cable. Wireless networks, on the other hand, transmits data in any direction to any device that becomes a listener (be listening) within a limited range.

See below, descriptions of network protocols without WEP, WPA and WPA2, respectively.

  1. Wired Equivalent Privacy (WEP): The original encryption protocol developed for wireless networks. As the name translated says, WEP was designed to provide the same level of security as wired networks. In entano, WEP has many well-known security holes, it is difficult to set up and is easily broken.
  2. Wi-Fi Protected Access (WPA): Presented as a temporary safety accessory on WEP while 802.11i standard was being developed. Most current implementations use a WPA pre-shared key (PSK), commonly referred to as WPA Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. The WPA Enterprise uses an authentication server to generate keys or certificates.
  3. Wi-Fi Protected Access version 2 (WPA2): Based on wireless security 802.11i, which was finalized in 2004. The most significant increase WPA2 on WPA is the use of Advanced Encryption Standard (AES) for encryption. The security provided by AES is sufficient (and approved) for use by the US government to encrypt information classified as top secret – it’s probably good enough to protect its secrets as well as.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s