Theme 1: Utilize all technology, don't shut down creativity by denying students. CET 751 was about the infrastructure of the network, but it also was a time for us to explore topics of interest and be creative in presenting the information we found. In this class I learned it is okay to not know everything, but be open to the new and learn from the students.
Theme 3: Professional development for teachers needs to be continuous and offered in variety to allow for teachers to find comfort with technology and also learn it is okay to not know everything. Again, this class allowed for individualized learning of interest. We were allowed to research what was important to us and then we shared and learned from each other.
Theme 3: Professional development for teachers needs to be continuous and offered in variety to allow for teachers to find comfort with technology and also learn it is okay to not know everything. Again, this class allowed for individualized learning of interest. We were allowed to research what was important to us and then we shared and learned from each other.
CET 751 Computer Hardware and Networking Essentials
Computer Hardware and Networking Essentials was my first class to the MSET program. Originally I thought I would go back to school to get my technology endorsement. Dr. Hawks suggested this as my first class. One research paper later, the first day on campus started. On day one, I walked into class, partnered with Jared and took apart a computer. As the groups were putting the computers back together, One computer popped and smoke filled the area. The group next to us then plugged in their computer and flames shot out toward me, nearly removing some of my hair. It was the best day ever. Needless to say, Jared and I were very careful and had no issues with our computer. Working with the physical hardware in this class was important to what I do everyday. I have learned to teach myself how to trouble shoot computer issues and repair them. The research project also gave me the opportunity to learn more about networking and put together a picture of what I was working with.
Research Project: A Historical look at wireless networking
Janelle R. Gregg
Professor Tom Farrell
CET 751: Computer Hardware and Networking Essentials
10 June 2013
A Historical Look at Wireless Networking: pros and cons in an evolving technology
Today, everywhere we go, people are communicating via wireless technology. How did this advancement in technology come about? Should we be worried about this development and the implications it may hold, or do we just go with it and have fun communicating across the globe? Wireless networking is not a new technology. Its origins stem from the ham-radio and a 1985 decision to allow use of radio waves. The decision to make wireless networking available to the general public was not made lightly. Consumers of wireless networking should gain a general history of what they are working with, weigh the pros and cons, and understand the security risks and solutions of the technology they use daily.
WIRELESS NETWORKING
A wireless local area network (WLAN) uses radio waves to connect devices to a network, internet, and other computers connected through the same network. (What Is a Wireless Network?: The Basics) In a wireless network there are two basic physical components: stations (STA) and access points (AP). Stations are the computers or devices. Access points are the hubs; the devices that send and receive signals to connect the network. (Weber and Bahadur)
In order for the STA to access an AP, it has a wireless network interface card (NIC) to transmit and receive radio frequency (RF) signal. A NIC is a separate card that slides into the expansion slot of a computer. It converts data from parallel to serial transmission and divides the data into packets to send to other computer addresses. The NIC also determines when to send or transmit a packet. (Ciampa, Chapter 6: Low-Speed Wireless Local Area Networks 184-185)
Access points have three components: an antenna to send and receive signal, a wired network interface to connect to the wired network, and bridging software. The AP sends data back and forth between wireless devices and from wireless to wired components of the network. (Ciampa, Chapter 6: Low-Speed Wireless Local Area Networks 188-189) An AP uses a service set identifier (SSID) to allow for identification of a specific AP or “hotspot”. Any wireless device can access a hotspot if the hotspot is unsecured or if the user has the access code. (McDowell, Householder and Lytle)
There are two basic ways to configure a network. Ad Hoc mode or independent basic service set (IBSS) allows devices to communicate directly with each other. Infrastructure mode, basic service set (BSS), has at least one AP which bridges the STAs together and can connect to a network like and wired intranet. (Weber and Bahadur)
HISTORICAL CONTEXT
Wireless networking, now commonly known as Wi-Fi, had an unusual beginning. According to Mitchell Lazarus[i], “Wi-Fi is a creature of regulation, created more by lawyers than by engineers.” (A brief history of Wi-Fi)
In 1985 the Federal Communications Commission (FCC) opened several bands of radio wave in the wireless spectrum to be used without government licensing. Three chunks of spectrum called “the garbage bands” were taken from the medical, scientific, and industrial areas to be used for communication. Except for the ham-radio, this was unheard of. (A brief history of Wi-Fi)
These “garbage bands” were at 900MHz, 2.4GHz, and 5.8GHz. They were already allocated for other equipment like the microwave, which uses radio frequencies for energy to cook food. The communication devices would have to steer clear of these other devices. In order to do this, they used “spread spectrum.” This is where signals are sent across multiple frequencies rather than the single frequency method. It would be harder to intercept communication, and devices would be less susceptible to interference from the other equipment using these frequencies.[ii] (A brief history of Wi-Fi)
Though this step had been taken, the technology did not spread. Industry vendors created devices for wireless communications, but these devices were not compatible across industries. It wasn’t until 1988 that a standard was set; it called for compatibility, so these devices could work together. Then progress was made. NCR Corporation asked one of its top engineers, Mr. Hayes, to set a standard. He approached the Institute of Electrical and Electronics Engineers (IEEE) to complete this work. A committee, 802.3, had defined the Ethernet standard. A new committee, with Hayes as chairman, was formed, and negotiations began. It became known as 802.11. (A brief history of Wi-Fi)
With the need for 75% of the committee to vote in agreement, it took until 1997 to set a basic specification. This new specification allowed for data-transfer at a rate of two megabits per second. It used either of two spread spectrum technologies, frequency hopping or direct sequence transmission.[iii] The standard had two variants that became known as 802.11b and 802.11a. These were lengthy 400 page standards. (A brief history of Wi-Fi)
With problems still arising, in August 1999, six companies came together to form a new committee. They formed the Wireless Ethernet Compatibility Alliance (WECA). WECA’s job was to certify that devices were truly compatible, across the industry, with the new standard. The name Wi-Fi came from the compatibility of devices to work in this new standard. (A brief history of Wi-Fi)
Beside the development of compatible devices, standards were being developed for networks themselves. In 1990, the standard was approved for wireless local area networks (WLAN). Since then, WLAN has surpassed growth expectations. Today, it is not only found in business and education; it is also found in coffee shops, ball parks, airlines and more. (Ciampa, Chapter 6: Low-Speed Wireless Local Area Networks 181)
PROS AND CONS
At first the high cost of wireless networking kept it from booming, but as laptops became equipped with wireless cards and the costs for networking came down, more places began moving to wireless. Companies now had to weigh the pros and cons of the technology. (Fletcher)
In the beginning, wireless networks could not keep up with wired networks for speed and security, but as enhancements were continually made, the gap was narrowing. Users took convenience over a small difference in speed. As wireless networks grew, mobility of wireless technology allowed a user to move within the environment and stay connected to the network. This meant that productivity could increase. Instead of one employee working at a desk, wireless access allowed for access to internet and applications while networking with others and collaborating ideas. (What Is a Wireless Network?: The Basics) (Ciampa, Chapter 1: Introduction to Wireless Communications 19-20)
Now, companies and business find wireless networking convenient and less expensive to set up and expand. Expansion is probable with the existing technology in a business. By adding wireless to an existing network, wiring costs are minimized. This becomes more cost effective. (What Is a Wireless Network?: The Basics) With a new network, very little wiring needs to be done. In many cases, an Ethernet connection is all that is needed. Also, Power over Ethernet (PoE) adds more convenience as power outlets are not needed for APs. (Fletcher) Installation is much easier and less expensive, especially in older buildings. The structure itself can cause problems with wiring, and wireless becomes a less expensive fix. With this, there is also an increase in reliability. In wired networks, environment becomes an issue. Cable failure is the most common problem. If a cable breaks in a wall or moisture causes corrosion, replacement of the damaged section or restringing of the cable becomes necessary. Wireless eliminates this type of failure. It also makes a quick backup system, bringing a company up and running more quickly after a natural disaster. (Ciampa, Chapter 1: Introduction to Wireless Communications 19-20)
Some of the negatives of wireless technology come in the form of interference. As stated in the history of wireless technology. The devices run off the same frequency of radio waves as other commercial equipment. This can cause interference, either to the device or from the device. Microwaves cell phone, other networks all run across the same or overlapping channels. This can cause issues, reducing the range or blocking access to the wireless network. (Fletcher)
Bandwidth is another issue with wireless technology. One of the first standards supported up to 11Mbps with a typical speed of 6.5 Mbps. Another standard moved speeds up to 54Mbps, with 24 to 25 Mbps being typical. The new standard, 802.11n has a max speed of 540Mbps. Speed is growing and adapting; however, the problem remains. The bandwidth of the network is shared by all devices on the network. The more users put on a network, the more the bandwidth is divided and the less speed per individual device. Also, one device could take so much bandwidth that it slows down or takes other devices off the network. Large files sent over the network can bring the network down. Users have to monitor their usage of the network and remain cognizant of others on the network. (Fletcher)
An unknown deterrent to wireless technology could be health implications. Studies have shown that emission of radio frequency energy in high levels can cause biological damage. Wireless devices only emit low levels, but research is unclear if this is harmful or not. The Food and Drug Administration (FDA) and the FCC set policies for wireless devices such as cell phones. In 2002 the FDA stated “the available science does not allow us to conclude that (wireless devices) are absolutely safe, or that they are unsafe.” It then also stated “The available scientific evidence does not demonstrate any adverse health effects associated with the use of (wireless devices).” (Ciampa, Chapter 1: Introduction to Wireless Communications 21-22) It is still unclear if this is a risk or not.
Weighing the pros and cons, there are some things to think about when deciding whether or not to choose a wireless network.
The final aspect in this discussion of wireless technology is the controversy of security. Is wireless technology the right choice when it comes to security? The possibility of unauthorized access causes problems. Users want the convenience, but they also expect to be safe. Issues to think about when dealing with security include the following.
As mentioned, authentication is another area to help secure your system. Authenticating and authorizing your wireless clients can make it nearly impossible for an attacker to gain access. (Weber and Bahadur) Restricting access allows only certain machines to be identified by the system. A media access control (MAC) address is used to identify each machine on the network. (McDowell, Householder and Lytle) MAC address filtering is used to control access. A device address is entered into software which then allows or denies the device onto the network. Since it is impossible to know all MAC addresses, the filter works by placing all permitted addresses into the software. (Ciampa, Chapter 8: Wireless Network Security 302-303)
The second step of authentication happens once the connection to the Wi-Fi is made. The network can be set up so that a user needs to authenticate by entering a password when entering the network. (McDowell, Householder and Lytle) One way to authenticate is through open system authentication. The AP signal is broadcast to a device through the SSID. The computer sends back a signal with a matching SSID and the AP allows access. (Ciampa, Chapter 8: Wireless Network Security 303)
There are many steps to making sure you have a secure network. Besides encrypting data and having a device authenticate and authorize, there are some basic steps to remember. First remember to change the SSID. When a wireless STA uses a SSID to identify the wireless network, an attacker can see the SSID. Changing the default name can help confuse an attacker. Do not use a name that can easily be associated with your business. Second, make sure you configure your AP correctly. Make sure to close down the management interfaces properly. Third, segment the wireless network. It should be treated as a remote access network and be separated from the corporate intranet. Use a firewall, packet filter, or similar device between the AP and the corporate intranet. This can prevent damage should the wireless network get broken into. Fourth, prevent physical access. Place antennas of the APS to restrict access outside the work environment. (Weber and Bahadur) If an AP can be adjusted, set the power level to keep the signal within the work area. (Ciampa, Chapter 8: Wireless Network Security 311)A couple other things to try would be to not broadcast the SSID and to stay current with anti-virus software. This way, if someone gains access, damage is limited. (McDowell, Householder and Lytle) Finally, you can use Rogue AP Discovery tools to probe the airwaves and set up Wireless Virtual LANS (VLANs) using one for employees and a separate for guests. (Ciampa, Chapter 8: Wireless Network Security 311-313)
Why take all of these precautions? Because there are attackers who think it is exciting to see just what they can break into and what damage can be caused. One way attackers go after your system is through “wardriving.” This is the practice of using a computer, a wireless card, and a GPS to find unsecured wireless hotspots or APs. An attacker then posts this information to a website for others to use. People with malicious intent can gain access to anyone’s personal information using that unsecured hotspot. (McDowell, Householder and Lytle) People also mark an unsecured hotspot by what is known as “warchalking.” When the unsecured hotspot is found, an attacker will mark the sidewalk or a wall nearby notifying other attackers of this unsecured location. (Ciampa, Chapter 8: Wireless Network Security 299)
A favorite attack, sometimes hard to detect, is the fake anti-virus attack. A pop up will appear on a computer claiming to be free software to protect against a virus. If the computer operator engages in the free software, it will claim to find a virus and freeze your computer until you enter a credit card number. (Ciampa, Chapter 8: Wireless Network Security 5)
Other common areas of attack include: online banking, phone solicitation, fraud via emails, infected USB devices, malware, and attacks against Graphic Processing Units (GPUs). Attackers use GPUs to break passwords into the central processing unit (CPU).[iv] (Ciampa, Chapter 8: Wireless Network Security 5-7)
Attackers are continually finding ways to get around security measures, so security measures need to continually change and advance. Vendors patch their programs, but up to 55% of software vulnerabilities came from lack of patching. The vendors cannot keep up with everything that is hitting them. This along with user confusion causes problems. Users need to be alert and skeptical when on a network. Be aware that questions like “Do you want to view only the content that was delivered securely?” have a place. Clicking “no” opens the door to an attack, be aware of the site and if you trust it. (Ciampa, Chapter 8: Wireless Network Security 5-10)
When dealing with wireless technology, what should a consumer be aware of? Know your history. Having a basic knowledge of where technology came from helps relieve confusion when dealing with the different aspects of that technology. Weigh the pros and cons. There are many good parts to wireless network and some parts that may be a concern and need more attention. If those concerns center on security issues, know what security is available, use it, and continually advance your security settings. Being a wise consumer is the key. Though it is fun to not worry and have fun with our wireless devices, remembering to be safe can save you a huge headache from an attack.
[i] Mitchell Lazarus is an expert in telecoms regulation at Fletcher, Heald & Hildreth, a law firm based in Arlington, Virginia.
[ii] Until this time, spread spectrum technology was designed for military use only.
[iii] The first avoids interference from other signals by jumping between radio frequencies; the second spreads the signal out over a wide band of frequencies.
[iv] Passwords of 7 characters or less are no longer sufficient. It is suggested that in the near future a password of 12 characters will not be sufficient. Passwords need to include alpha, numeric, and symbol characters.
Works Cited"A brief history of Wi-Fi." 2004. The Economist. Technology Quarterly. 1 June 2013 <http://www.economist.com/node/2724397>.
Ciampa, Mark. "Chapter 1: Introduction to Security." Ciampa, Mark. Security + Guide to Network Security Fundamentals 4th Ed. Boston: Course Technology, Cengage Learning, 2012. 1-40.
Ciampa, Mark. "Chapter 1: Introduction to Wireless Communications." Ciampa, Mark. Guide to Wireless Communications. Boston: Course Technology a division of Thompson Learning, 2002. 1-28.
Ciampa, Mark. "Chapter 6: Low-Speed Wireless Local Area Networks." Ciampa, Mark. Guide to Wireless Communications. Boston: Course Technology a division of Thompson Learning, 2002. 181-232.
Ciampa, Mark. "Chapter 8: Wireless Network Security." Ciampa, Mark. Security + Guide to Network Security Fundamentals. Boston: Course Technology, Cengage Learning, 2012. 291-330.
Fletcher, Steve. "Pros and Cons of Wireless Networks." 2009. Certification Magazine. Media Tech Publishing. 1 June 2013 <http://www.certmag.com/read.php?in=2920>.
McDowell, Mindi, Allen Householder and Matt Lytle. Security Tip (ST05-003) Securing Wireless Networks. 06 February 2013. Department of Homeland Security. 1 June 2013 <http://www.us-cert.gov/ncas/tips/ST05-003>.
Weber, Chris and Gary Bahadur. "Wireless Networking Security." 2013. Microsoft Technet. 1 June 2013 <http://technet.microsoft.com/en-us/library/bb457019.aspx>.
"What Is a Wireless Network?: The Basics." n.d. Cisco. 1 June 2013 <http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/work_from_anywhere/what_is_a_wireless_network/index.html>.
"Wireless Networking: The Basics." n.d. Cisco. 1 June 2013 <http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/work_from_anywhere/wireless_networking/index.html>.
Professor Tom Farrell
CET 751: Computer Hardware and Networking Essentials
10 June 2013
A Historical Look at Wireless Networking: pros and cons in an evolving technology
Today, everywhere we go, people are communicating via wireless technology. How did this advancement in technology come about? Should we be worried about this development and the implications it may hold, or do we just go with it and have fun communicating across the globe? Wireless networking is not a new technology. Its origins stem from the ham-radio and a 1985 decision to allow use of radio waves. The decision to make wireless networking available to the general public was not made lightly. Consumers of wireless networking should gain a general history of what they are working with, weigh the pros and cons, and understand the security risks and solutions of the technology they use daily.
WIRELESS NETWORKING
A wireless local area network (WLAN) uses radio waves to connect devices to a network, internet, and other computers connected through the same network. (What Is a Wireless Network?: The Basics) In a wireless network there are two basic physical components: stations (STA) and access points (AP). Stations are the computers or devices. Access points are the hubs; the devices that send and receive signals to connect the network. (Weber and Bahadur)
In order for the STA to access an AP, it has a wireless network interface card (NIC) to transmit and receive radio frequency (RF) signal. A NIC is a separate card that slides into the expansion slot of a computer. It converts data from parallel to serial transmission and divides the data into packets to send to other computer addresses. The NIC also determines when to send or transmit a packet. (Ciampa, Chapter 6: Low-Speed Wireless Local Area Networks 184-185)
Access points have three components: an antenna to send and receive signal, a wired network interface to connect to the wired network, and bridging software. The AP sends data back and forth between wireless devices and from wireless to wired components of the network. (Ciampa, Chapter 6: Low-Speed Wireless Local Area Networks 188-189) An AP uses a service set identifier (SSID) to allow for identification of a specific AP or “hotspot”. Any wireless device can access a hotspot if the hotspot is unsecured or if the user has the access code. (McDowell, Householder and Lytle)
There are two basic ways to configure a network. Ad Hoc mode or independent basic service set (IBSS) allows devices to communicate directly with each other. Infrastructure mode, basic service set (BSS), has at least one AP which bridges the STAs together and can connect to a network like and wired intranet. (Weber and Bahadur)
HISTORICAL CONTEXT
Wireless networking, now commonly known as Wi-Fi, had an unusual beginning. According to Mitchell Lazarus[i], “Wi-Fi is a creature of regulation, created more by lawyers than by engineers.” (A brief history of Wi-Fi)
In 1985 the Federal Communications Commission (FCC) opened several bands of radio wave in the wireless spectrum to be used without government licensing. Three chunks of spectrum called “the garbage bands” were taken from the medical, scientific, and industrial areas to be used for communication. Except for the ham-radio, this was unheard of. (A brief history of Wi-Fi)
These “garbage bands” were at 900MHz, 2.4GHz, and 5.8GHz. They were already allocated for other equipment like the microwave, which uses radio frequencies for energy to cook food. The communication devices would have to steer clear of these other devices. In order to do this, they used “spread spectrum.” This is where signals are sent across multiple frequencies rather than the single frequency method. It would be harder to intercept communication, and devices would be less susceptible to interference from the other equipment using these frequencies.[ii] (A brief history of Wi-Fi)
Though this step had been taken, the technology did not spread. Industry vendors created devices for wireless communications, but these devices were not compatible across industries. It wasn’t until 1988 that a standard was set; it called for compatibility, so these devices could work together. Then progress was made. NCR Corporation asked one of its top engineers, Mr. Hayes, to set a standard. He approached the Institute of Electrical and Electronics Engineers (IEEE) to complete this work. A committee, 802.3, had defined the Ethernet standard. A new committee, with Hayes as chairman, was formed, and negotiations began. It became known as 802.11. (A brief history of Wi-Fi)
With the need for 75% of the committee to vote in agreement, it took until 1997 to set a basic specification. This new specification allowed for data-transfer at a rate of two megabits per second. It used either of two spread spectrum technologies, frequency hopping or direct sequence transmission.[iii] The standard had two variants that became known as 802.11b and 802.11a. These were lengthy 400 page standards. (A brief history of Wi-Fi)
With problems still arising, in August 1999, six companies came together to form a new committee. They formed the Wireless Ethernet Compatibility Alliance (WECA). WECA’s job was to certify that devices were truly compatible, across the industry, with the new standard. The name Wi-Fi came from the compatibility of devices to work in this new standard. (A brief history of Wi-Fi)
Beside the development of compatible devices, standards were being developed for networks themselves. In 1990, the standard was approved for wireless local area networks (WLAN). Since then, WLAN has surpassed growth expectations. Today, it is not only found in business and education; it is also found in coffee shops, ball parks, airlines and more. (Ciampa, Chapter 6: Low-Speed Wireless Local Area Networks 181)
PROS AND CONS
At first the high cost of wireless networking kept it from booming, but as laptops became equipped with wireless cards and the costs for networking came down, more places began moving to wireless. Companies now had to weigh the pros and cons of the technology. (Fletcher)
In the beginning, wireless networks could not keep up with wired networks for speed and security, but as enhancements were continually made, the gap was narrowing. Users took convenience over a small difference in speed. As wireless networks grew, mobility of wireless technology allowed a user to move within the environment and stay connected to the network. This meant that productivity could increase. Instead of one employee working at a desk, wireless access allowed for access to internet and applications while networking with others and collaborating ideas. (What Is a Wireless Network?: The Basics) (Ciampa, Chapter 1: Introduction to Wireless Communications 19-20)
Now, companies and business find wireless networking convenient and less expensive to set up and expand. Expansion is probable with the existing technology in a business. By adding wireless to an existing network, wiring costs are minimized. This becomes more cost effective. (What Is a Wireless Network?: The Basics) With a new network, very little wiring needs to be done. In many cases, an Ethernet connection is all that is needed. Also, Power over Ethernet (PoE) adds more convenience as power outlets are not needed for APs. (Fletcher) Installation is much easier and less expensive, especially in older buildings. The structure itself can cause problems with wiring, and wireless becomes a less expensive fix. With this, there is also an increase in reliability. In wired networks, environment becomes an issue. Cable failure is the most common problem. If a cable breaks in a wall or moisture causes corrosion, replacement of the damaged section or restringing of the cable becomes necessary. Wireless eliminates this type of failure. It also makes a quick backup system, bringing a company up and running more quickly after a natural disaster. (Ciampa, Chapter 1: Introduction to Wireless Communications 19-20)
Some of the negatives of wireless technology come in the form of interference. As stated in the history of wireless technology. The devices run off the same frequency of radio waves as other commercial equipment. This can cause interference, either to the device or from the device. Microwaves cell phone, other networks all run across the same or overlapping channels. This can cause issues, reducing the range or blocking access to the wireless network. (Fletcher)
Bandwidth is another issue with wireless technology. One of the first standards supported up to 11Mbps with a typical speed of 6.5 Mbps. Another standard moved speeds up to 54Mbps, with 24 to 25 Mbps being typical. The new standard, 802.11n has a max speed of 540Mbps. Speed is growing and adapting; however, the problem remains. The bandwidth of the network is shared by all devices on the network. The more users put on a network, the more the bandwidth is divided and the less speed per individual device. Also, one device could take so much bandwidth that it slows down or takes other devices off the network. Large files sent over the network can bring the network down. Users have to monitor their usage of the network and remain cognizant of others on the network. (Fletcher)
An unknown deterrent to wireless technology could be health implications. Studies have shown that emission of radio frequency energy in high levels can cause biological damage. Wireless devices only emit low levels, but research is unclear if this is harmful or not. The Food and Drug Administration (FDA) and the FCC set policies for wireless devices such as cell phones. In 2002 the FDA stated “the available science does not allow us to conclude that (wireless devices) are absolutely safe, or that they are unsafe.” It then also stated “The available scientific evidence does not demonstrate any adverse health effects associated with the use of (wireless devices).” (Ciampa, Chapter 1: Introduction to Wireless Communications 21-22) It is still unclear if this is a risk or not.
Weighing the pros and cons, there are some things to think about when deciding whether or not to choose a wireless network.
- Understand the capability of current products
- Understand your networking needs
- Understand the potential risk you are facing
- Find a solution tailored to your environment (Weber and Bahadur)
The final aspect in this discussion of wireless technology is the controversy of security. Is wireless technology the right choice when it comes to security? The possibility of unauthorized access causes problems. Users want the convenience, but they also expect to be safe. Issues to think about when dealing with security include the following.
- Data encryption, so only authorized users can access information over your wireless network
- User authentication, which identifies computers trying to access the network
- Secure access for visitors and guests
- Control systems, which protect the laptops and other devices that use the network. (Wireless Networking: The Basics)
As mentioned, authentication is another area to help secure your system. Authenticating and authorizing your wireless clients can make it nearly impossible for an attacker to gain access. (Weber and Bahadur) Restricting access allows only certain machines to be identified by the system. A media access control (MAC) address is used to identify each machine on the network. (McDowell, Householder and Lytle) MAC address filtering is used to control access. A device address is entered into software which then allows or denies the device onto the network. Since it is impossible to know all MAC addresses, the filter works by placing all permitted addresses into the software. (Ciampa, Chapter 8: Wireless Network Security 302-303)
The second step of authentication happens once the connection to the Wi-Fi is made. The network can be set up so that a user needs to authenticate by entering a password when entering the network. (McDowell, Householder and Lytle) One way to authenticate is through open system authentication. The AP signal is broadcast to a device through the SSID. The computer sends back a signal with a matching SSID and the AP allows access. (Ciampa, Chapter 8: Wireless Network Security 303)
There are many steps to making sure you have a secure network. Besides encrypting data and having a device authenticate and authorize, there are some basic steps to remember. First remember to change the SSID. When a wireless STA uses a SSID to identify the wireless network, an attacker can see the SSID. Changing the default name can help confuse an attacker. Do not use a name that can easily be associated with your business. Second, make sure you configure your AP correctly. Make sure to close down the management interfaces properly. Third, segment the wireless network. It should be treated as a remote access network and be separated from the corporate intranet. Use a firewall, packet filter, or similar device between the AP and the corporate intranet. This can prevent damage should the wireless network get broken into. Fourth, prevent physical access. Place antennas of the APS to restrict access outside the work environment. (Weber and Bahadur) If an AP can be adjusted, set the power level to keep the signal within the work area. (Ciampa, Chapter 8: Wireless Network Security 311)A couple other things to try would be to not broadcast the SSID and to stay current with anti-virus software. This way, if someone gains access, damage is limited. (McDowell, Householder and Lytle) Finally, you can use Rogue AP Discovery tools to probe the airwaves and set up Wireless Virtual LANS (VLANs) using one for employees and a separate for guests. (Ciampa, Chapter 8: Wireless Network Security 311-313)
Why take all of these precautions? Because there are attackers who think it is exciting to see just what they can break into and what damage can be caused. One way attackers go after your system is through “wardriving.” This is the practice of using a computer, a wireless card, and a GPS to find unsecured wireless hotspots or APs. An attacker then posts this information to a website for others to use. People with malicious intent can gain access to anyone’s personal information using that unsecured hotspot. (McDowell, Householder and Lytle) People also mark an unsecured hotspot by what is known as “warchalking.” When the unsecured hotspot is found, an attacker will mark the sidewalk or a wall nearby notifying other attackers of this unsecured location. (Ciampa, Chapter 8: Wireless Network Security 299)
A favorite attack, sometimes hard to detect, is the fake anti-virus attack. A pop up will appear on a computer claiming to be free software to protect against a virus. If the computer operator engages in the free software, it will claim to find a virus and freeze your computer until you enter a credit card number. (Ciampa, Chapter 8: Wireless Network Security 5)
Other common areas of attack include: online banking, phone solicitation, fraud via emails, infected USB devices, malware, and attacks against Graphic Processing Units (GPUs). Attackers use GPUs to break passwords into the central processing unit (CPU).[iv] (Ciampa, Chapter 8: Wireless Network Security 5-7)
Attackers are continually finding ways to get around security measures, so security measures need to continually change and advance. Vendors patch their programs, but up to 55% of software vulnerabilities came from lack of patching. The vendors cannot keep up with everything that is hitting them. This along with user confusion causes problems. Users need to be alert and skeptical when on a network. Be aware that questions like “Do you want to view only the content that was delivered securely?” have a place. Clicking “no” opens the door to an attack, be aware of the site and if you trust it. (Ciampa, Chapter 8: Wireless Network Security 5-10)
When dealing with wireless technology, what should a consumer be aware of? Know your history. Having a basic knowledge of where technology came from helps relieve confusion when dealing with the different aspects of that technology. Weigh the pros and cons. There are many good parts to wireless network and some parts that may be a concern and need more attention. If those concerns center on security issues, know what security is available, use it, and continually advance your security settings. Being a wise consumer is the key. Though it is fun to not worry and have fun with our wireless devices, remembering to be safe can save you a huge headache from an attack.
[i] Mitchell Lazarus is an expert in telecoms regulation at Fletcher, Heald & Hildreth, a law firm based in Arlington, Virginia.
[ii] Until this time, spread spectrum technology was designed for military use only.
[iii] The first avoids interference from other signals by jumping between radio frequencies; the second spreads the signal out over a wide band of frequencies.
[iv] Passwords of 7 characters or less are no longer sufficient. It is suggested that in the near future a password of 12 characters will not be sufficient. Passwords need to include alpha, numeric, and symbol characters.
Works Cited"A brief history of Wi-Fi." 2004. The Economist. Technology Quarterly. 1 June 2013 <http://www.economist.com/node/2724397>.
Ciampa, Mark. "Chapter 1: Introduction to Security." Ciampa, Mark. Security + Guide to Network Security Fundamentals 4th Ed. Boston: Course Technology, Cengage Learning, 2012. 1-40.
Ciampa, Mark. "Chapter 1: Introduction to Wireless Communications." Ciampa, Mark. Guide to Wireless Communications. Boston: Course Technology a division of Thompson Learning, 2002. 1-28.
Ciampa, Mark. "Chapter 6: Low-Speed Wireless Local Area Networks." Ciampa, Mark. Guide to Wireless Communications. Boston: Course Technology a division of Thompson Learning, 2002. 181-232.
Ciampa, Mark. "Chapter 8: Wireless Network Security." Ciampa, Mark. Security + Guide to Network Security Fundamentals. Boston: Course Technology, Cengage Learning, 2012. 291-330.
Fletcher, Steve. "Pros and Cons of Wireless Networks." 2009. Certification Magazine. Media Tech Publishing. 1 June 2013 <http://www.certmag.com/read.php?in=2920>.
McDowell, Mindi, Allen Householder and Matt Lytle. Security Tip (ST05-003) Securing Wireless Networks. 06 February 2013. Department of Homeland Security. 1 June 2013 <http://www.us-cert.gov/ncas/tips/ST05-003>.
Weber, Chris and Gary Bahadur. "Wireless Networking Security." 2013. Microsoft Technet. 1 June 2013 <http://technet.microsoft.com/en-us/library/bb457019.aspx>.
"What Is a Wireless Network?: The Basics." n.d. Cisco. 1 June 2013 <http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/work_from_anywhere/what_is_a_wireless_network/index.html>.
"Wireless Networking: The Basics." n.d. Cisco. 1 June 2013 <http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/work_from_anywhere/wireless_networking/index.html>.
wireless_networking_presentation.pptx | |
File Size: | 2697 kb |
File Type: | pptx |