You are on page 1of 10

Wireless Network Security

What is a Wireless Network?


A group of
connected devices
that communicate
through the air by
means of
electromagnetic
waves, such as radio
waves.
Types of Wireless Networks
WPAN – Wireless Personal Area
Network - dynamically connect devices
within a relatively small area; maintain
random network configurations.
i.e. Bluetooth, ad-hoc networks
WLAN - Wireless Local Area Network -
connect devices over a more broad area,
known as a cell. Can be found in our homes,
libraries, and coffee shops.
i.e. Wi-Fi, laser bridges
Types of Wireless Networks
WMAN’s are the connection of multiple
WLAN’s and may span an entire city or
college campus.
i.e. WiMAX
Mobile device networks which are
used by our cell phones.
i.e. GSM (2G), 3G cellular networks
Wireless Applications
Laptops Laser Bridges
Cellular phones Emergency Services
Headphones Robotics
Keyboards Biotechnology
Printers Nanotechnology
Speakers Radio Frequency
Global Positioning Identification (RFID)
Systems (GPS) transponders
The possibilities are endless!
Our Responsibility
 We must  Physical theft
understand and 1. Be aware of your
adequately address surroundings.
the inherent 2. Secure your devices
security risks when they are not
involved with in use.
wireless  Wireless medium
networking.
Types of unauthorized
access:

Accidental association
When a user turns on a computer and it
latches on to a wireless access point from
a neighboring company’s overlapping
network, the user may not even know that
this has occurred. However, it is a security
breach in that proprietary company
information is exposed and now there
could exist a link from one company to the
other. This is especially true if the laptop is
also hooked to a wired network.
Ad-hoc networks
Ad hoc networks are defined as [peer to peer] networks
between wireless computers that do not have an access
point in between them. While these types of networks
usually have little protection, encryption methods can be
used to provide security.
Non-traditional networks
Non-traditional networks such as personal network Bluetooth
devices are not safe from hacking and should be regarded as
a security risk. Even barcode readers, handheld PDAs, and
wireless printers and copiers should be secured. These non-
traditional networks can be easily overlooked by IT personnel
who have narrowly focused on laptops and access points.
Identity theft (MAC spoofing)
Man-in-the-middle attacks
Denial of service
Network injection
Café Latte attack
Counteracting security risks

 All wireless LAN


devices need to be
secured
 All users of the
wireless network need
to be educated in
wireless network
security
 All wireless networks
need to be actively
monitored for
weaknesses and
breaches

You might also like