Wifi Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

CYBER SECURITY

WI-FI SECURITY
Protecting Your Digital Life

SEMESTER -5
VINISKY KUMAR
Contents
1. Introduction
2. Why Wi-Fi Security Matters?
3. Types of wireless security protocols
4. Examples of wireless security threats and risks
5. Security Best Practices
6. Conclusion
7. Bibliography
Introduction Grade 10 Mathematics

What is Wi-Fi?
Wi-Fi, short for Wireless Fidelity, has become an integral part of our daily lives.
It allows us to connect our devices wirelessly to the internet, providing flexibility and
convenience.

What Is Wi-Fi Security?


Wi-Fi security is the protection of devices and networks connected in a wireless
environment. Without Wi-Fi security, a networking device such as a wireless access point or
Open Notes Quiz
a router can be accessed by anyone using a computer or mobile device within range of the
Teacher Sari Purdue
router's wireless signal.
How do unsecured Wi-Fi networks create risk?

When wireless devices in a network are "open" or unsecured, they're accessible to


any Wi-Fi-enabled device, such as a computer or smartphone, that's within range of
their wireless signals.

Using open or unsecured networks can be risky for users and organizations.
Adversaries using internet-connected devices can collect users' personal information
and steal identities, compromise financial and other sensitive business data,
"eavesdrop" on communications, and more
Why Wi-Fi Security Matters? Grade 10 Mathematics

The Risks of Unsecured Wi-Fi Networks

Unsecured Wi-Fi networks are like open doors for cybercriminals.


Hackers can easily gain access to your network, potentially compromising your digital life.

Data Theft and Privacy Concerns


Unsecured Wi-Fi makes it easy for attackers to intercept data transmitted
between your devices and the internet.
Personal information, financial data, and login credentials are at risk of being
stolen.
Malicious Activities

Hacking: Without proper security, hackers can infiltrate your network, gaining access to
your devices and data.

Malware: Unsecured Wi-Fi networks can be used as vectors for delivering malware,
infecting your devices with viruses, ransomware, or spyware.

Phishing: Attackers can use unsecured networks to launch phishing attacks, tricking you
into revealing sensitive information.
Types of wireless security
Gradeprotocols
10 Mathematics

There are four main wireless-security protocols. These protocols were developed by the Wi-Fi
Alliance, an organization that promotes wireless technologies and interoperability. The group
introduced three of the protocols, described below, in the late 1990s. Since then, the
protocols have been improved with stronger encryption. The fourth protocol was released in
2018.

Wired Equivalent Privacy (WEP) is the first security protocol ever


put in practice. Designed in 1997, it has become obsolete but is
Wired Equivalent still used in modern times with older devices. WEP uses a data
encryption scheme that is based on a combination of user- and
Privacy (WEP) system-generated key values. However, it is widely known that
WEP is the least secure network type as hackers have developed
tactics of reverse-engineering and cracking the encryption
system.
Wi-Fi Protected Access (WPA) was developed to deal with the
flaws that were found with the WEP protocol. WPA offers features
such as the Temporal Key Integrity Protocol (TKIP) which was a
Wi-Fi Protected Access
dynamic 128-bit key that was harder to break into than WEP’s
(WPA) static, unchanging key.It also introduced the Message Integrity
Check, which scanned for any altered packets sent by hackers,
the Temporal Key Integrity Protocol (TKIP), and the pre-shared
key (PSK), among others, for encryption.

WPA2, a later version of WPA, was developed in 2004. It's easier to


configure and provides even greater network security than WPA by
using a security protocol known as the Advanced Encryption
Wi-Fi Protected Access 2 Standard (AES). Versions of the WPA2 protocol are available for
individual users and enterprises.
(WPA2)
It’s comes in two main types or modes, each with its own security
features: WPA2-PSK , WPA2-Enterprise
WP3 is introducing the first major changes to wireless security in
Grade
14 10AMathematics
years. new generation of WPA(WPA3), is designed to deliver
simpler configuration and even stronger (192-/256-/384-bit)
Wi-Fi Protected Access 3 encryption and security than any of its predecessors. It is also
meant to work across the latest Wi-Fi 6 networks.Some notable
(WPA3) additions for the security protocol are:

Greater protection for passwords


Individualized encryption for personal and open networks
More security for enterprise networks.
Grade 10 Mathematics
Examples of wireless security threats and risks
Grade 10 Mathematics

The proliferation of public Wi-Fi also creates security issues for individual users and organizations. These
networks are by definition "open" and, therefore, unprotected. Devices accessing public networks are
highly susceptible to malware, spyware, and other malicious activity, such as the MITM attack described
earlier. Following are a few examples of other types of wireless security issues.

Attackers use IP spoofing to penetrate wireless networks by impersonating


IP spoofing trusted IP addresses. This approach may allow attackers to plant malware,
initiate distributed-denial-of-service (DDoS) attacks, or carry out other
nefarious acts.

Wireless networks are also susceptible to a threat known as DNS-cache


DNS-cache poisoning, often called DNS spoofing. This tactic involves hacking a network
poisoning and diverting network traffic to an attacker's computer or server or to another
out-of-network device. The risk for users is connecting to a malicious version of
a legitimate network they want to access.
Grade 10 Mathematics
Bad actors can use open or unsecured wireless networks to conduct illegal
activity, monitor web traffic, steal information, and more. They can do this by
"piggybacking" on the internet service of real subscribers. The bad actors tap
into the unsecure service to set up their own internet connections, without the
legitimate users' knowledge.

Piggybacking and There is another version of this practice, known as "wardriving." Individuals
wardriving drive, walk, or cycle slowly through densely populated areas with wireless-
equipped laptops or smartphones, searching for unsecured wireless networks
to connect to. While instances of piggybacking and wardriving are often
cases of people who are just seeking "free" internet connections, there's
certainly a question of whether these practices are ethical. And many
individuals who engage in these activities are intent on mischief. That's why
Wi-Fi security should be a top-of-mind concern for all users of Wi-Fi networks.
What are some ways to protect a Wi-Fi network?

One basic best practice for Wi-Fi security is to change default passwords for network devices.
Most devices feature default administrator passwords, which are meant to make setup of the devices
easy. However, the default passwords created by device manufacturers can be easy to obtain online.
Changing the default passwords for network devices to more-complex passwords—and changing them
often—are simple but effective ways to improve Wi-Fi security. Following are other Wi-Fi network
security methods:

Another basic approach to Wi-Fi security is to use MAC addresses,


which restrict access to a Wi-Fi network. (A MAC address is a unique
Media Access Control code or number used to identify individual devices on a network.)
(MAC) addresses While this tactic provides a higher measure of security than an open
network, it is still susceptible to attack by adversaries using "spoofed"
or modified addresses.
A more common method of protecting Wi-Fi networks and devices is the use of
security protocols that utilize encryption. Encryption in digital communications
encodes data and then decodes it only for authorized recipients.
Encryption There are several types of encryption standards in use today, including Wi-Fi
Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2).
Most newer network devices, such as access points and Wi-Fi routers, feature
built-in wireless-security encryption protocols that provide Wi-Fi protection.

VPNs are another source of Wi-Fi network security. They allow users to
Virtual private networks create secure, identity-protected tunnels between unprotected Wi-Fi
(VPNs) networks and the internet.A VPN can encrypt a user's internet connection. It
also can conceal a user's IP address by using a virtual IP address it assigns to
the user's traffic as it passes through the VPN server.
There are many types of consumer and enterprise software that also
can provide Wi-Fi security. Some Wi-Fi protection software is bundled
with related products, such as antivirus software.A vast array of security
software aimed at the consumer and enterprise markets can provide
Security software protection to wireless networks and Wi-Fi-enabled devices such as
routers, switches, controllers, and access points. Many of these solutions
are downloadable to wireless LANs (WLANs) and mobile devices.Some
newer software solutions designed to secure Wi-Fi are built into the
backbone of the internet and are available via cloud platforms.
Conclusion
Wi-Fi security is not an option but a necessity.

Recap of Key Points


Wi-Fi security is essential to safeguard your data and privacy.
Common threats include data theft, hacking, and malware.
Secure your Wi-Fi network with strong passwords and encryption.
Regularly update router firmware and monitor network activity

The Responsibility of Every Wi-Fi User

Wi-Fi security is a shared responsibility.


As Wi-Fi users, we must take proactive steps to protect our networks.
By following best practices, we contribute to a safer digital environment for ourselves and others.
Remember, security begins at home – secure your Wi-Fi, protect your digital life.
Bibliography
1. IEEE 802.11-1997 Information Technology- telecommunications And Information
exchange Between Systems-Local And Metropolitan Area Networks-specific
Requirements-part 11: Wireless Lan Medium Access Control (MAC) And Physical Layer
(PHY) Specifications. 1997. doi:10.1109/IEEESTD.1997.85951. ISBN 978-0738130446.
2. "Definition of WEP". PCMAG. Retrieved 2021-06-04.
3. LinkedIn. "How Can You Secure a Wi-Fi Network With WPA2?". Lifewire. Retrieved
2021-06-04.
4. "How to: Define Wireless Network Security Policies". Retrieved 2008-10-09.
5. "Wireless Security Primer (Part II)". windowsecurity.com. 2003-04-23. Retrieved
2008-04-27.
6. "Fitting the WLAN Security pieces together". pcworld.com. 2008-10-30. Retrieved
2008-10-30.
7. "Security Vulnerabilities and Risks in Industrial Usage of Wireless Communication".
IEEE ETFA 2014 – 19th IEEE International Conference on Emerging Technology and
Factory Automation. Retrieved 2014-08-04.

You might also like