Wireless LAN Security
Wireless local area networks (WLANs) based on the Wi-Fi (wireless fidelity) standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They can be made to work with a minimum of effort without relying on specialized corporate installers.
Some of the
business advantages of WLANs include:
" Mobile workers can be continuously connected to their crucial applications and data;
" New applications based on continuous mobile connectivity can be deployed;
" Intermittently mobile workers can be more productive if they have continuous access to email, instant messaging, and other applications;
" Impromptu interconnections among arbitrary numbers of participants become possible.
" But having provided these attractive benefits, most existing WLANs have not effectively addressed security-related issues.
" Mobile workers can be continuously connected to their crucial applications and data;
" New applications based on continuous mobile connectivity can be deployed;
" Intermittently mobile workers can be more productive if they have continuous access to email, instant messaging, and other applications;
" Impromptu interconnections among arbitrary numbers of participants become possible.
" But having provided these attractive benefits, most existing WLANs have not effectively addressed security-related issues.
THREATS TO WLAN ENVIRONMENTS
All wireless
computer systems face security threats that can compromise its
systems and services. Unlike the wired network, the intruder does
not need physical access in order to pose the following security
threats:
Eavesdropping
This involves
attacks against the confidentiality of the data that is being
transmitted across the network. In the wireless network, eavesdropping
is the most significant threat because the attacker can intercept
the transmission over the air from a distance away from the premise
of the company.
Tampering
The attacker
can modify the content of the intercepted packets from the wireless
network and this results in a loss of data integrity.
Unauthorized
access and spoofing
The attacker
could gain access to privileged data and resources in the network
by assuming the identity of a valid user. This kind of attack
is known as spoofing. To overcome this attack, proper authentication
and access control mechanisms need to be put up in the wireless
network.
No comments:
Post a Comment