WIRELESS LAN SECURITY

SEMINAR ON WIRELESS LAN SECURITY : Wireless LAN (WLAN) based on Wi-Fi (wireless fidelity) are one of the standards of the fastest growing technologies in today's businesses, schools and homes, for good reason. Provide mobile access to Internet and corporate networks so that users can stay connected away from their desk. These networks can be up and running quickly when there is no Ethernet cable infrastructure available. They can be designed to operate with minimal effort without relying on specialist installers of the company.
Some of the benefits of wireless companies are:
"Mobile workers can be continuously connected to their applications and critical data;
"The new applications based on continuous mobile connectivity can be deployed;
"Mobile workers intermittently be more productive if they have continuous access to email, instant messaging and other applications;
"Interconnections between Impromptu arbitrary number of participants is possible.
"But when, if you have interesting benefits, most of the current WLAN is not effectively dealt with security issues.
WLAN ENVIRONMENTAL THREATS
All computer systems against wireless security threats that could compromise its systems and services. Unlike the wired network, you need not intruder has physical access to provide the following security threats:
Eavesdropping
These attacks against the confidentiality of data transmitted over the network. In the wireless network, listening is the greatest threat because the attacker can intercept the radio transmission from a distance from the premise of the company.
Tampering
The attacker can modify the contents of intercepted packets in the wireless network and this results in a loss of data integrity.
Unauthorized access and spoofing
Attacker can gain privileged information and resources for the network carrying the identity of a valid user name. Such an attack is called "spoofing." To overcome this attack, authentication and access control mechanisms are packaged in a wireless network.
Denial of Service
This attack the intruder floods the network, whether valid or invalid messages affecting the available network resources. An attacker can flood a wireless station can be forced to use up precious battery.
Other security threats
Other threats come from the weakness of network management and vulnerabilities of wireless LAN standards, for example, the vulnerabilities of Wired Equivalent Privacy (WEP), which is compatible with IEEE 802.11 wireless LAN.



No comments:

Post a Comment