0% found this document useful (0 votes)
82 views12 pages

Wireless Security

Wireless networks are vulnerable to several security threats if not properly secured. Unencrypted wireless networks allow anyone within range to access the network and steal data. Common wireless threats include unauthorized access, eavesdropping on network traffic, and man-in-the-middle attacks. Proper security measures like encryption protocols and firewalls help prevent threats by restricting access to authorized users only.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views12 pages

Wireless Security

Wireless networks are vulnerable to several security threats if not properly secured. Unencrypted wireless networks allow anyone within range to access the network and steal data. Common wireless threats include unauthorized access, eavesdropping on network traffic, and man-in-the-middle attacks. Proper security measures like encryption protocols and firewalls help prevent threats by restricting access to authorized users only.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

EGBEYEMI BUKOLA PRICILLA

20200705010131

WIRELESS SECURITY

MRS GANIYU AMINAT


(Department of Computer Science)
 
 
DEPARTMENT OF COMPUTER STUDIES
TABLE OF CONTENTS
⬡ Background
⬡ What is Wireless Security?
⬡ How Does Wireless Security Work? 
⬡ What Are The Typed Of Wireless Security?
⬡ Advantages of Wireless security
⬡ Disadvantages of Wireless Security
⬡ What are the Main Threats to Wireless Security?
⬡ Conclusion
⬡ References

2
Background
Modern operating systems such as Linux,
Anyone within the geographical network If router security is not activated or if the
macOS, or Microsoft Windows make it
range of an open, unencrypted wireless owner deactivates it for convenience, it
fairly easy to set up a PC as a wireless LAN
network can "sniff", or capture and record, creates a free hotspot. Since most 21st-
"base station" using Internet Connection
the traffic, gain unauthorized access to century laptop PCs have wireless
Sharing, thus allowing all the PCs in the
internal network resources as well as to the networking built in (see Intel "Centrino"
home to access the Internet through the
internet, and then use the information and technology), they don't need a third-party
"base" PC. However, lack of knowledge
resources to perform disruptive or illegal adapter such as a PCMCIA Card or USB
among users about the security issues
acts. Such security breaches have become dongle. Built-in wireless networking might
inherent in setting up such systems often
important concerns for both enterprise and be enabled by default, without the owner
may allow others nearby access to the
home networks. realizing it, thus broadcasting the laptop's
connection. Such "piggybacking" is usually
accessibility to any computer nearby.
achieved without the wireless network
operator's knowledge; it may even be
without the knowledge of the intruding user
if their computer automatically selects a
nearby unsecured wireless network to use as
an access point.

3
What is Wireless
Security?
Wireless security is in essence, the prevention of unwanted
users from accessing a particular wireless network. More
so, wireless security, also known as Wi-Fi security, aims to
ensure that your data remains only accessible to users you
authorize.
How Does Wireless Security Work?
Wireless security is in essence, the prevention of unwanted users from accessing a
particular wireless network. More so, wireless security, also known as Wi-Fi
security, aims to ensure that your data remains only accessible to users you
authorize.
⬡ Wired Equivalent Privacy (WEP)
⬡ Wi-Fi Protected Access (WPA)
⬡ Wi-Fi Protected Access 2 (WPA 2)
⬡ Wi-Fi Protected Access 3 (WPA 3)

To be sure your network is secure, you must first identify which network yours falls under.

5
What Are The Types Of Wireless Security?
As previously mentioned, there are four main types of wireless security protocols. Each
of these varies in utility and strength.

⬡ WIRED EQUIVALENT PRIVACY ⬡ WI-FI PROTECTED ACCESS (WPA) ⬡ WI-FI PROTECTED ACCESS 2 (WPA2)
(WEP) Wi-Fi Protected Access (WPA) was developed to deal In 2004, WPA2 brought significant changes and
Wired Equivalent Privacy (WEP) is the first security with the flaws that were found with the WEP more features to the wireless security gambit.
protocol ever put in practice. Designed in 1997, it has protocol. WPA offers features such as the Temporal WPA2 replaced TKIP with the Counter Mode
become obsolete but is still used in modern times Key Integrity Protocol (TKIP) which was a dynamic
Cipher Block Chaining Message Authentication
with older devices.  128-bit key that was harder to break into than WEP’s
Code Protocol (CCMP) which is a far superior
static, unchanging key.
WEP uses a data encryption scheme that is based on encryption tool.
a combination of user- and system-generated key It also introduced the Message Integrity Check,
which scanned for any altered packets sent by WPA2 has been the industry standard since its
values. However, it is widely known that WEP is the
least secure network type as hackers have developed hackers, the Temporal Key Integrity Protocol (TKIP), inception, on March 13, 2006, the Wi-Fi
tactics of reverse-engineering and cracking the and the pre-shared key (PSK), among others, for Alliance stated that all future devices with the
encryption system. encryption. Wi-Fi trademark had to use WPA2

6
ADVANTAGES OF WIRELESS SECURITY

⬡ Mobility: The main advantage of wireless computing is virtually limitless mobility. Wireless technology
provides the ability for users to connect to the internet or their office networks from virtually anywhere,
without the hassles of wires.
⬡ Flexible: The lack of wires and the restrictions which they entail allows extreme flexibility in the layout of a
computing environment.
⬡ Resilience, Maintenance, and Expansion: Wireless systems often are more resilient than wired systems due to
the simple fact that wires can be damaged through various processes such as fire, accidental destruction, water
damage, and general aging and corrosion of wires and infrastructure.
⬡ Ease of Installation: WLAN are also easy to install, an entire network can be put together in a matter of hours
rather than days. WLAN may be installed where rewiring is impractical.
⬡ Cost: wireless network may cost less than a traditional network because it requires fewer pieces of physical
hardware to set up.

7
DISAVANTAGES OF WIRELESS SECURITY
⬡ Interference: Wireless networks suffer from the persistent problem of signal interference. Our modern society
provides a large number of conveniences which produce radio signals which may interfere with the frequency of
the wireless signals being sent. There are generally two types of signal interference in an office network
environment. Inward interference is caused by things such as microwaves, elevator motors, and cordless phones.
⬡ High power consumption: A major problem with wireless computing is power management. Currently batteries
in mobile computing devices have limited amounts of energy, which can be quickly expended in the effort of
sending wireless signals.
⬡ Security: The major disadvantage to wireless computing is security. Radio waves can easily penetrate walls and
buildings and the signals may be passively retrieved without being noticed.
⬡ Speed: Wireless devices are almost always slower than the same network using a wired configuration (about 4 to
6 megabits per second).
⬡ Limited range: Wireless LANs can transmit up to 1,00 feet without losing connection. The rule of wireless
transmission is higher the data rate, the shorter the range.

8
What are the Main Threats to
Wireless Security?

As the internet is becoming more accessible, via


mobile devices and gadgets, data security is becoming
a top concern from the public, as it should be. Data
breaches and security malfunctions can cost
individuals and businesses thousands of dollars.
 
It is important to know the threats that are most
prevalent in order to be able to implement the proper
security measures.

9
What are the Main Threats to Wireless Security?
⬡ MAN-IN-THE-MIDDLE ⬡ CRACKING AND ⬡ PACKET SNIFFERS
ATTACKS DECRYPTING PASSWORDS
Packet sniffers are computer
A man-in-the-middle (MITM) attack is Cracking and decrypting passwords is programs that can monitor traffic on
an incredibly dangerous type of cyber an old method that consists of what is a wireless network. They can also
attack that involves a hacker infiltrating known as “A brute force attack.” This intercept some data packages and
a private network by impersonating a attack consists of using a trial and error provide a user with their contents.
rogue access point and acquiring login approach and hoping to eventually guess They can be used to harmlessly
credentials. correctly. However, there are many tools gather data about traffic, but in the
that hackers can use to expedite the wrong hands can introduce errors and
The attacker sets up hardware
process. break down a network.
pretending to be a trusted network,
namely Wi-Fi, in order to trick Software like John the Ripper, Nessus,
unsuspecting victims into connecting to and Hydra are a good place to start.
it and sending over their credentials.
MITM attacks can happen anywhere, as
devices connect to the network with the
strongest signal, and will connect to any
SSID name they remember.

10
CONCLUSION
⬡ Wireless LANs provide new challenges to security and network administrators those
are outside of the wired network. The inherent nature of wireless transmission and the
availability of published attack tools downloaded from the Internet, security threats
must be taken seriously. Best practices dictate a well thought out layered approach to
WLAN security. Access point configuration, firewalls, and encryption should be
considered. Security policies should be defined for acceptable network thresholds and
performance.
⬡ Furthermore, this report also indicates the advantages and disadvantages of a wireless
security

11
References
⬡ https://www.securew2.com/blog/complete-guide-wi-fi-security
⬡ https://en.wikipedia.org/wiki/Wireless_security#Background
⬡ https://en.wikipedia.org/wiki/Wireless_security#Threats_and_Vulne
rabilites_in_an_industrial_(M2M)_context
⬡ https://www.slidescarnival.com/tag/tech

12

You might also like