Network and Wireless Security



"Wireless networks are inherently insecure" (Lawrence, 2018).

"Wireless network security primarily protects a wireless network from unauthorized and malicious access attempts". (Technopedia, 2018)
There are 3 indispensable wireless security protocols: WEP, WPA, and WPA2, each with their own strengths, and weaknesses.
In addition to preventing uninvited guests from connecting to your wireless network, wireless security protocols encrypt your private data as it is being transmitted over the airwaves.

To further understand these protocols we need to define each one of them:

Wired Equivalent Privacy (WEP):
The original encryption protocol developed for wireless networks. As its name implies, WEP was designed to provide the same level of security as wired networks. However, WEP has many well-known security flaws, is difficult to configure, and is easily broken.

Wi-Fi Protected Access (WPA): Introduced as an interim security enhancement over WEP while the 802.11i wireless security standard was being developed. Most current WPA implementations use a preshared key (PSK), commonly referred to as WPA Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. WPA Enterprise uses an authentication server to generate keys or certificates.

Wi-Fi Protected Access version 2 (WPA2): Based on the 802.11i wireless security standard, which was finalized in 2004. The most significant enhancement to WPA2 over WPA is the use of the Advanced Encryption Standard (AES) for encryption. The security provided by AES is sufficient (and approved) for use by the U.S. government to encrypt information classified as top secret.


Wired VS Wireless:
Although many of these issues have since been addressed, wireless networks are generally not as secure as wired networks. Wired networks, at their most basic level, send data between two points, A and B, which are connected by a network cable. Wireless networks, on the other hand, broadcast data in every direction to every device that happens to be listening, within a limited range.

3 Ways to Secure Wireless Network: 
(Based on Greier's tips)
Use an inconspicuous network name (SSID):Using the vendor’s default name of the service set identifier SSID, like “infinitumbcd2” or "MariaInternet", can make it easier for someone to crack the personal mode of WPA or WPA2 security. This is because the encryption algorithm incorporates the SSID, and password cracking dictionaries used by hackers are preloaded with common and default SSIDs.

Remember physical security:You can have the best encryption possible but if you aren't careful with basic security measures like, having an exposed reset button that someone can press to restore factory default settings, removing the Wi-Fi security and allowing anyone to connect. So make sure that Access Points are always mounted out of reach and consider using any locking mechanisms to limit access to the AP buttons and ports.

Use Enterprise WPA2 with 802.1X authentication
Deploying the enterprise mode of Wi-Fi security authenticates every user individually.
Everyone can have their own Wi-Fi username and password. So if someone loses their laptop or smartphone you don't have to change the password on every single device (personal mode), by contrast, in enterprise mode all you have to do is change or revoke that particular user’s log-ins.
Another great advantage of enterprise mode is that every user is assigned their own encryption key. That means users can only decrypt data traffic for their own connection, there is no looking around on anyone else’s wireless traffic.


References:Lawrence, M (2018). WIRELESS SECURITY PROTOCOLS: WEP, WPA, AND WPA2. Dummies. Retrieved from: https://www.dummies.com/computers/computer-networking/wireless/wireless-security-protocols-wep-wpa-and-wpa2/

Technopedia. (2018). Wireless Network Security. Technopedia. Retrieved from: https://www.techopedia.com/definition/29915/wireless-network-security

Greier, E. (2017). 5 Ways to Secure Wi-Fi Networks. Network World From IDG. Retrieved from: https://www.networkworld.com/article/3224539/mobile-wireless/5-ways-to-secure-wi-fi-networks.html

Comentarios

Entradas más populares de este blog

Wsq03