Professional Documents
Culture Documents
Wireless Security Draft
Wireless Security Draft
Security is an important issue, it is especially important when dealing with the most vital
connections in our daily lives. With all of our exposure and dependence on wireless networks,
understanding how to protect sensitive and essential information is key. Wireless security
concerns are vast, this paper aims to discuss in detail how and why certain practices and
protocols are followed. Topics will include firewalls, encryption, Wi-Fi protected Access as well
as the most common threats that come with this type of connection.
Introduction:
It is really no surprise that wireless networks are such a huge part of our lives. It is one of
the most convenient applications that we have access to. You would be hard-pressed to find
someone that isn’t in immediate distress when they are suddenly without Wi-Fi access. Wireless
information, people and countless other resources that have become an essential part of our daily
lives. Some of the information and resources can include sensitive materials. Much of the
population can and prefers to operate their various business, financial and other personal
communications through wireless networks. With that being said, it is important to understand
this application, how it works and how to protect yourself from any threats while utilizing it on a
daily basis.
of radio waves. (Conklin, pg.63) Not all types of wireless networks are created equal, the
functions of the networks will vary in terms of their different speeds, sizes and range capabilities.
Most people are familiar with the term Wi-Fi, however most people are more accustomed to Wi-
Fi’s end result and not what it is, so the paper will start with WLAN. WLAN, wireless local area
networks, operates through the IEEE 802.11 standard. The distribution of the connection is
accomplished through an AP, access point. The user can use this connection while in the covered
network. This would be recognizable as the Wi-Fi used and available while in a relativity smaller
areas such as coffee shops, campuses, and other building the have this service. (wifinotes.com)
WWAN, wireless wide area networks, cover a larger area than its WLAN counterpart. This
would be what people would know as their cell phone coverage in large areas outdoors, this
would result in slower service and additional charges by the cellular provider. WMAN, wireless
metropolitan area networks refer to a connection to the internet between networks that is
interconnected through a shared LAN. It is basically the in between of WLAN and WWAN in
terms of range. (oreilly.com) WPAN, wireless personal area networks, cover the smallest of all
the areas that have been discussed. This would be most commonly seen in Bluetooth technology.
(computernetworkingnotes.com)
Protocols:
The protocols used in wireless networks provide security while utilizing wireless
networks. WLAN, uses the protocol standard 802.11. This protocol has several different versions
that have been developed, there is more than ten variations of this specification. This protocol is
widely used and was created by the Institute of Electrical and Electronics Engineers or IEEE.
These protocols differ in terms of GHz frequency capacities, range, security features, amount of
throughput and compatibility between the versions. (Meyers, pg.1068) WEP, Wired Equivalent
Privacy has the ability to encrypt data through its algorithm. The client and the access point will
share a secret key that will check the security of the packets. (berkeley.edu) WPA, Wi-Fi
protected Access, offers an improvement from the flaws in WEP, more on the flaws of each
later. WPA utilized the algorithm, TKIP, Temporal Key Integrity Protocol which provided a
more secure system referred to as per-packet key. This encryption key scheme offered 128-bits
per packet, over the 104-bit maximum of WEP. (Conklin, pg. 65) WPA2, is the improved second
version of WPA. WPA2 uses yet another for its encryption of data called Advanced Encryption
Standard, AES and replaced the use of TKIP with CCMP, Counter Mode with Cipher Block
Regardless of the many advancements that continue to be made to the protocols and
security features for wireless networking, there will always be threats to data. For every new
security feature, there will be another risk being created by a determined individual. A rouge AP,
Rouge Access Point, refers to an unauthorized access point. A rouge AP can threaten the
infrastructure of a network through DoS attacks and acquire access to important data through
man-in-the-middle attacks. This is especially freighting because rouge AP are hard to detect
before the harm is done, they are not even protected by the firewall, and they are hidden threats.
(Meyers, pg.541) Configuration issues can range from issues with an invalid IP address and
troubleshooting issues. There is of course, a countless other malicious attacks that everyone
There are many steps that can be taken that will allow wireless network users to help
safeguard their information. One of the most obvious practices that everyone should
automatically do is to make sure your encryption and firewall settings are always on. There
really is no reason to overlook this step, it does not require any addition hardware or software
and will be able to save users from preventable threats. Another very simple tasks that a user can
complete is to keep up with changing passwords and creating them with security in mind,
Sources:
All-In-One CompTIA Security+ Exam Guide, 4th Edition, By William Arthur Conklin and
Gregory White, McGraw Hill, ©2015, ISBN-13: 978-0-07-184124-5
CompTIA A+ Certification Exam Guide - 8th Edition (Exams 220-801 & 220-802 By Mike
Myers, ©2012, McGraw Hill Publishing, ISBN-13: 9780071795128
Network+ Certification All-In-One Exam Guide - 6th Edition – Meyers
Babcock, C. (2014, March 3). 9 Worst Cloud Security Threats - InformationWeek. Retrieved
November 1, 2015, from http://www.informationweek.com/cloud/infrastructure-as-a-
service/9-worst-cloud-security-threats/d/d-id/1114085
Jamsa, K. (2012). Cloud Computing (1st ed., p. 322). Burlington, MA: Jones & Bartlett
Learning.
Turner, S. (2013). Benefits and risks of cloud computing. Journal of Technology Research, 4, 1-
7. Retrieved from http://ezproxy.bellevue.edu:80/login?url=http://search.proquest.com/
docview/1460848651?accountid=28125
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/
work_from_anywhere/what_is_a_wireless_network/index.html
https://www.fcc.gov/consumers/guides/protecting-your-wireless-network
http://www.pcmag.com/article2/0,2817,2420002,00.asp
http://www.infosec.gov.hk/english/technical/files/wireless.pdf
http://www.howtogeek.com/167783/htg-explains-the-difference-between-wep-wpa-and-wpa2-
wireless-encryption-and-why-it-matters/
http://www.sersc.org/journals/IJMUE/vol3_no3_2008/8.pdf
http://compnetworking.about.com/od/networkprotocols/tp/guide-to-wireless-network-
protocols.htm
http://support.usr.com/download/whitepapers/wireless-wp.pdf
http://computernetworkingnotes.com/wireless-networking-on-cisco-router/types-of-wireless-
networks.html
http://arxiv.org/ftp/arxiv/papers/1406/1406.0298.pdf
https://en.wikipedia.org/wiki/Wireless_network
http://www.pcmag.com/encyclopedia/term/54444/wi-fi
http://chimera.labs.oreilly.com/books/1230000000545/ch05.html#_ubiquitous_connectivity
http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html