Monday, April 1, 2019
Accidental And Malicious Association: Wireless Networking
inadvertent And Malicious Association Wireless NetworkingWireless interlock is a piano tuner communication surrounded by two interconnect nodes without the use of wires. Mobility lifts the requirement for a fixed point of connection to the mesh topology which allows users to move personally magical spell using their devices.Mobiles computers such as laptops computer and personal digital assistants (PDAs), be the growing sector in computer industry 1. Wireless networks stand many uses. A common is the port adapted office.Wireless networks be the common, both for organisations and individuals. Many nonebooks computer have radio card that allow connecting to a radio set network. However, piano tuner networking has many gage issues, wireless has fewer physical assets to protect but at the same time there is no locked door on the airwaves so it is far easy to hack 2. Therefore, nag found wireless network much more easily to calve into.Wireless SecurityWireless technology users warranter threat has been change magnitude as the service become more popular. There are amount of security threats with the current wireless protocols and encryption methods has been grown due to the disrespect and ignorance of the users and at corporate IT levels. Cracking has become easier with user-fri annihilately Windows or Linux-based ray of light due to the easily availability on the web at no charge.Types of unauthorised access1. Accidental associationViolation of the security of a corporate network can come from a number of various methods. One of these referred to as accidental association. When a user turns on a computer and it latches on to a wireless network or wireless access point of a neighbouring firms overlapping network, the user may not even know that this is occurred. However this is the breach in security in that proprietary firm information is exposed and now there could constitute a link from one accompany to the other and there talent be a c hance when a data is been transferred within a firm it can be at a risk and its fairness might have been compromised.2. Malicious associationMalicious association are when wireless network of a company is accessed by a wireless device such as cracking laptop instead of a company access point (AP). These types of laptops are known as salving APs. When thief gained accessed to the wireless network they can steal password or can plant a Trojans.3. Ad-hoc networksAd-hoc networks can pose a security threats, this network are defined as peer to peer networks amongst wireless computers which do not have an access point between them.Ad-hoc networks provide a bridge into other networks. In a company network environment its provided a bridge into other organisation network finished unsecured ad-hoc connection. Ad-hoc network are defaults setting in close(prenominal) version of Microsoft Windows, it is turned on unless explicitly disable. There are basically two types of Bridging in Ad- hoc network. A direct bridge and a verificatory bridge, direct bridge is created by a user who configure a bridge between two connections whereas indirect bridge has two security hazards. The first hazards is that important company data is been obtained via the secured network on the users end node computer drive, which exposed to discovery via the unsecured Ad-hoc network. The second hazards is that a virus was placed on the users computer via the unsecured Ad-hoc connection which machinate way to the company secured network.4. Identity theft (MAC spoofing)When a hacker is able to listen into network traffic and identify the MAC address of a computer is called MAC spoofing. Some program has the sniffleing capability which combines software that permits a computer to pretend it has any address that the hacker wished for. Wireless network system allow MAC filtering to some extend so that unaccompanied authorised with specific MAC IDs can only access the network.When the wireless device is switch off or is off the air and so only MAC filtering is effective. Any wireless devices (802.11) on the air channel its unencrypted MAC address, which required no specific equipment or software to ascertain it. With any 802.11 receiver such as laptop and a freeware share analyser can get the MAC address of any infection 802.11 device within range. In a company network where most of the wireless devices are on the air, MAC filtering provides security only to forestall unauthorised connection to the company infrastructure and does nothing to prevent a direct attack.5. Man-in-the middle attacks.In this type of attack, attacker incites computers to log into a computer which is set up as a soft AP (Access point). after(prenominal) this hacker connects to a real Access point through some other wireless device which maintains a steady flow of traffic through the transparent hacking computer to the real network which provide hacker to sniff the traffic. This attack usual ly disrupt the real connection and reconnecting with the hackers soft AP, these attacks are enhanced by software such as LANjack and AIRjack.Online bookshttp//books.google.com/books?id=Ic6Ai8Y7LoACprintsec=frontcoverdq=wireless+networkshl=enei=UpbQTOfLF4HIswbozazNCAsa=Xoi=book_resultct=resultresnum=1ved=0CDUQ6AEwAAv=onepageqf=true date 2/11/10http//books.google.com/books?id=XO5VjslHLasCprintsec=frontcoverdq=wireless+securityhl=enei=fZ3QTOSpAYORswbMurzNCAsa=Xoi=book_resultct=resultresnum=1ved=0CDUQ6AEwAAv=onepageqf=true date 2/11/10
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment