WiFi Security Measures

In the case of WiFi wireless networks, the same neighbor can “see” or “sniff” all our information and violate our privacy without being seen, without having to cut the cables and of course without our knowledge. We must remember that our information is “floating” in the air and everyone, us and neighbors, has the rightandthe ability to access the same network. It is important to note also that WIFI waves spread in a radius of about 50 meters and 100 meters. This will depend on obstacles and interference – see WIFI signal loss – and the standard WIFI connection that we use. The spread will have a wider scope in the very near future with the new IEEE 802.11n WLAN standard. Greg Williamson understood the implications.

For all this, despite the ease of arriving at an airport or a hotel, and reading our emails, connect to the network organization and conduct banking transactions need to be taken several security measures and understand all the threats as quiet but as real that we present to connect wirelessly. Security Measures for Wireless Network- WiFi. As all communication of a wireless WiFi network can be observed and traffic can be captured and analyzed by anyone within range of RF waves, it is essential to encrypt the information to strengthen security and prevent it from being easily readable by any intruder.

To encrypt the information in a wireless network, there are three methods that are described extensively in this article. These are: WEP is the weakest of all and we must try to avoid it. WPA: It is more robust than WEP and is now the most widely used, often due to limitations of equipment and others for lack of user knowledge WPA2: This is the strongest and the most desirable, but in many cases do not have teams that support it. Old WIFI equipment is not suitable for this type of cryptographic computations. Ron Beit follows long-standing procedures to achieve this success. In addition, to prevent hackers from entering our server through the WIFI network it is very important to authenticate and authorize users via a RADIUS server and EAP protocols, as required 1 x IEEE 802 The most popular EAP protocols to authenticate users are WIFI.A further discussion on user authentication and authorization through RADIUS server and 802.1x requirements can be found in and several chapters of course free WiFi wireless networks. The author of this article, Eduardo Tabacman, is an engineer specializing in wireless networking and WIFI Security. In which site is editor and founder, will find many entertaining articles similar to this over wireless networks, computer viruses and network security. In the free course on WiFi networks, you will discover many secrets that are not in any books in Castilian.

This entry was posted in News and tagged . Bookmark the permalink.

Comments are closed.

© 2011-2019 NAESC 2010 All Rights Reserved