Wireless network is a radio communication between two interconnect nodes without the use of wires. Range of motion lifts the necessity for a set point of link with the network that allows users to go physically when using their devices.
Mobiles computer systems such as notebook computers computer and personal digital assistants (PDAs), are the growing sector in computer industry 1. Wireless sites have many uses. The is the lightweight office.
Wireless networks will be the common, both for organisations and individuals. Many notebooks computer have cellular cards that allow attaching to a radio network. However, cellular networking has many security issues, wireless has fewer physical assets to protect but at exactly the same time there is absolutely no locked door on the airwaves so it is very good easy to hack 2. Therefore, hacker found wireless network a lot more easily to break into.
Wireless Security
Wireless technology users security danger has been increased as the service are more popular. There are numbers of security threats with the current wireless protocols and encryption methods has been cultivated because of the carelessness and ignorance of the users with commercial IT levels. Breaking is becoming easier with user-friendly Glass windows or Linux-based tool because of the easily availability on the internet at no charge.
Types of unauthorised access
1. Accidental association
Violation of the security of any corporate network will come from a number of different methods. Among these known as accidental association. Whenever a user converts on some type of computer and it latches to a wireless network or cellular access point of an neighbouring firm's overlapping network, an individual may not even understand that is occurred. However this is the breach in security for the reason that proprietary organization information is exposed and now there might exist a web link in one company to the other and there might be a chance when a data is been transferred within a company it can be at a risk and its integrity may have been compromised.
2. Destructive association
Malicious relationship are when wireless network of an company is seen by a wireless device such as cracking laptop instead of a company gain access to point (AP). These kinds of laptops are known as "soft APs". When thief gained utilized to the cordless network they can take security password or can plant a Trojans.
3. Ad-hoc networks
Ad-hoc sites can present a security risks, this network are defined as peer to peer sites between wireless computers which don't have an gain access to point between them.
Ad-hoc networks provide a bridge into other systems. Inside a company network environment its provided a bridge into other company network through unsecured ad-hoc connection. Ad-hoc network are defaults setting in most version of Microsoft Windows, it is turned on unless explicitly disable. You will find in essence two types of Bridging in Ad-hoc network. A primary bridge and a indirect bridge, direct bridge is created by a individual who configure a bridge between two connections whereas indirect bridge has two security dangers. The first risks is the fact that important company data is been obtained via the secured network on the user's end node computer drive, which subjected to discovery via the unsecured Ad-hoc network. The second hazards is that a virus was located on the user's computer via the unsecured Ad-hoc connection which will make way to the company guaranteed network.
4. Identity theft (MAC spoofing)
When a hacker is able to listen closely into network traffic and identify the Mac pc address of an computer is called MAC spoofing. Some program has the sniffing functionality which combines software that allows a pc to pretend it includes any address that the hacker wished for. Cellular network system allow MAC filtering for some expand so that only authorised with specific Macintosh IDs can only just gain access to the network.
When the cellular device is turn off or is off the environment then only Macintosh filtering is effective. Any cordless devices (802. 11) on the air transmit its unencrypted MAC address, which required no specific equipment or software to detect it. With any 802. 11 device such as laptop and a freeware packet analyser can receive the Mac pc address of any transmitting 802. 11 device within range. In a company network where the majority of the cellular devices are on mid-air, Mac pc filtering provides security and then prevent unauthorised link with the company infrastructure and does nothing to avoid a direct assault.
5. Man-in-the middle attacks.
In this type of harm, attacker incites personal computers to log into some type of computer which is set up as a soft AP (Access point). After this hacker links to a genuine Access point through another cordless device which preserves a steady move of traffic through the transparent hacking computer to the true network which provide hacker to sniff the traffic. This harm usually disrupt the real interconnection and reconnecting with the hacker's very soft AP, these episodes are improved by software such as LANjack and AIRjack.
Online books
http://books. yahoo. com/literature?id=Ic6Ai8Y7LoAC&printsec=frontcover&dq=cellular+networks&hl=en&ei=UpbQTOfLF4HIswbozazNCA&sa=X&oi=book_result&ct=result&resnum=1&ved=0CDUQ6AEwAA#v=onepage&q&f=true date - 2/11/10
http://books. google. com/books?id=XO5VjslHLasC&printsec=frontcover&dq=wireless+security&hl=en&ei=fZ3QTOSpAYORswbMurzNCA&sa=X&oi=book_result&ct=result&resnum=1&ved=0CDUQ6AEwAA#v=onepage&q&f=true day 2/11/10