Wireless Networking


How can I make sure my wireless network is secure?

If you switch on a PC that has a wireless adapter and is running a relatively new operating system, such as Windows XP, it will automatically look for available wireless networks. While this makes connecting easy, it also makes it easy for anyone in the vicinity to detect and access your network. While there's a small degree of security inherent in a cabled network -- as an intruder must physically connect to the system -- a wireless hacker could access your network while in a car outside your building, or in the office next door. Even if your business data is secured by passwords, an unsecured connection could allow anyone to surf on your network, possibly running up a large download bill. For this reason, it's important to make sure your wireless connection is secured.

The most widely deployed security solution for wireless networks is WEP (Wired Equivalent Privacy), which encrypts data sent over the network. To gain access to a WEP-protected network, users must know both the network name -- generally referred to as an SSID -- and have a password for that network. By design, these are generally a nightmare to remember, and are changed regularly.

WEP is a form of encryption that is similar to SSL (secure sockets layer), which is used to secure Web browser sessions. The cryptological algorithm used by WEP is a very strong 128bit password key encryption. Unfortunately, although it does veil the content of data sent through the airwaves, the implementation of WEP lends itself to easy decryption by anyone willing to dedicate a few hours of their time. Nonetheless, protection via WEP is better than none, so make sure you enable it on your network.

An additional safety measure that can be taken is configuring all access points to restrict connections to predefined MAC addresses. A MAC address is a hexadecimal number that forms a unique hardware ID for every network card ever manufactured. A MAC address can be determined by typing ipconfig /all into a DOS or command window, or by viewing the network card hardware properties from the control panel. Configuring an access point to only accept connections from specified MAC address will ensure that no roaming wireless devices can browse your network. Bear in mind, however, that it won't prevent them from intercepting your transmissions! Another recommended setting is to disable any access points from broadcasting their network name or SSID wherever possible.

Properties for an infrastructure WLAN are shown here.

A more advanced form of protection is WPA (Wi-Fi Protected Access), which provides individual user authentication as well as more secure encryption. However, this is only effective if support is built into the operating system -- which is the case, for instance, with Windows XP but not with earlier releases of Windows. WPA is generally only active on 802.11g networks. WPA will be built into 802.11i, the successor to 802.11g.

It's worth reinforcing that these security standards are specifically designed only to protect the wireless component of your network, and that normal network security protocols should also be in place. If you try to carefully protect your network from casual intruders, but still allow connections with a guest log-in, you're going to run into trouble eventually.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

PC World Staff

PC World

3 Comments

Anonymous

1

Outdated

Article is outdated badly lolz... 802.11n is fastest now xP do a lil research on it and add that to ur assignments =D

mubarak shan tt

2

this was very use ful to me , thanks

john

3

THIS SUCK

Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?