Background
Background
The wireless network usually present many merits for improving productivity to an organization since they increase the accessibility to the data resources. The configuration of the network and the reconfiguration is a less difficult, quicker as well as a less expensive feature. Nonetheless, the wireless technology generates new threats along with alters to the pre-existing data security risk profile (Choi, Robles, Hong & Kim, 2008). An example, communication happens via the ‘air waves’ utilizing the frequencies of a radio , the risk for these kinds of interception is very high as compared to the wired networks. In the event that the message is not encrypted or perhaps it has been encrypted with a weak algorithm, an attacker could be able to access it, thus compromising on the confidentiality of the information (Laeeq, 2011). Despite the wireless networking altering on the risk which are related to various threats to the security, we are able to state the general aim of the security remain the similar to assessment to the wired networks. The objective of this paper is to highlight the understanding of the wireless network and provide preventive methods to cater to the various threats associated to it.
This report intend to look at the various threats that are associated to the wireless network. Additionally, it will highlight the countermeasures aimed at keeping the wireless network to be more secure (Laeeq, 2011). These preventive methods can be employed by the managers of the various organization to help them secure their data since it is one components, which is private to the companies.
There are various tools, which could be used when someone is undertaking a research especially on the wireless network security and preventive methods (Karygiannis & Owens, 2002). A research could use the scope on the local area network the tools to use would be personal computers, the switches and the access to the networks (Laeeq, 2011). Moreover, it could be important to use tools for communication within the local area network to be able to know how the attacks or breaches can happen in different situations.
The types of the wireless attacks
The popularity of the wireless network is due to its convenience, efficiency in the cost and the ease when it comes to integration with the other networks as well as the network components (Karygiannis & Owens, 2002). The benefits of the wireless network include the convenience, productivity, expandability and the cost is extremely low. Nonetheless, the wireless network can be faced with the various threats and some of these types of attacks are as follows:
Scope of engagement
Accidental association
This is where there is unauthorized access to the organization wireless networks, which could come from the various methods and intents (Perrig, Stankovic & Wagner, 2004). This method is when a user’s turns on a PC and it latches to the wireless access point from the neighboring organization-overlapping network. The user could may know such has occurred (Deng, Li & Agrawal, 2002). This is a breach since the proprietary firm data could be exposed and they may exist a link from one organization to another.
This is when the wireless devices could be actively be made by the crackers to be able to connect to an organization network via cracking the laptop rather than the firm access point. These kind of laptops are regarded as the ‘soft Access point’ (Deng, Li & Agrawal, 2002). Once the cracker has been able to gain the access they could steal passwords, perhaps launch an attack to the wired network or even they could plant a Trojan program.
This is essentially a peer-to-peer network between the wireless computers, which does not have an access point between them (Laeeq, 2011). These kind of the networks have little protection, and the use of encryption techniques could be used to provide security.
This usually occurs when a hacker has been able to listen in on the traffic of the network and identify the MAC address to the computer, which has the privileges of the network (Laeeq, 2011). Most of the wireless systems usually allow some kind of the MAC to filter on the allowed authorized computer through use of the MAC ids to be able to gain the access and use the network (Choi, Robles, Hong & Kim, 2008). Such threats could be mitigated through combining of other software, which allow the computer to be able to pretend it has MAC address, which the crackers could desire, and this will enable them to get around the hurdle.
When it comes to the network injection attack, the hacker usually make the use of the access point, which are much exposed to non-filtered traffic of the network especially on broadcasting of the network traffic for example the spanning tree (802.1D), HSRP or the RIP (Deng, Li & Agrawal, 2002). The hacker is able to inject on the bogus networking re-configuration commands that have an effect to the routers, the switches and the intelligent of the hubs (Laeeq, 2011). Because of this attack, they are able to bring the entire network down which would require rebooting or perhaps reprogramming of the intelligent network devices.
Tools that are used
This is also referred to as DoS which takes places when an hacker bombard a target Access point with a bogus request, failure messages or even other commands (Deng, Li & Agrawal, 2002). These types of request could cause the legitimate users not to access the network and it could even cause the network to crash. The attack majorly rely on the abuse of the protocols for example that of the Extensible Authentication protocol.
Use of Encryption
The most secure way of securing on the network of the wireless network from the hackers is to be encrypted or perhaps scramble the communications over the networks (Zhang & Lee, 2000). Most of the wireless routers and the access point usually have an in built mechanism for the encryption (Karygiannis & Owens, 2002). The manufactures usually delivers the wireless routers that have encryption features but they are turned off therefore one should turn it to be on.
Turn off identifier broadcasting
The majority of the wireless routers normally have a mechanism that is known as the identifier broadcasting. It generally sends out the signal to any specific device which is in the area of a vicinity that announces its presence (Gleichauf, Randall, Teal, Waddell & Ziese , 2001 ) . You will not have to transmit the data in case the person utilizing the network is aware of its presence. The attackers could use its identifier that is broadcasting to home in the vulnerable wireless networks (Shiu, Chang, Wu, Huang & Chen, 2011). It is important to disable on the identifier, which is broadcasting the mechanism in case the wireless router could allow it.
Changing of the routers pre-set password for the administration
The manufacture for the wireless routers they could have assigned it as a standard default password, which could allow one to set up as well as operate their own router. The attackers usually knows the default passwords, it is therefore important to change it to something which only one knows (Gleichauf, Randall, Teal, Waddell & Ziese, 2001). The password should be longer in order to be tougher for the hackers to crack it.
Allow a given computer to access the wireless network
Each PC has the capacity to correspond with the network, which can be allocated to it applying its Media Access control address (Mashhour & Saleh, 2013). The wireless routers normally have a system, which permit particular device with a particular MAC address to access to the network (Karygiannis & Owens, 2002). Certain attackers are able to mimic the MAC addresses thus, it is important not to rely on this technique alone.
Summary of findings
Turning of the wireless network when one is not using it
The hackers cannot be able to access the wireless routers especially when it has been shut down. In case you turn the router off when not using, you can limit on the time, which is susceptible to the hack (Laeeq, 2011).
The position of setting up with the switch in the house
It may be a good move to put a remote switch as close and prudent to the center of the house. Moreover, this is to enable that the internet access does not have a remote sign, which extend outside the home that can be gotten by the hackers (Mashhour & Saleh, 2013). Additionally, it is advisable not to put it near a window where the signal can be accessed from the outside.
Impacts of real life
The wireless network can provide numerous opportunities especially to individuals as well as organization more so on increase on the productivity. In real life the wireless network have impacted on my life in that it is convenient, cost effective and there issue of integration with the other networks is much easier. The current computers that are sold today usually comes with the pre-equipped wireless network technology (Karygiannis & Owens, 2002). The research has offered insights on some of the wireless threats as well as preventive measures, which I intend to use for my own personal gain as well as educate to those who are not aware of the risks. as an individual it is important also to have an antivirus program to the working framework that could help prevent an attack to the system. Staying up to the latest technology upgrade could be important particularly when one want to have a secure network (Karygiannis & Owens, 2002). The significance of this is on the issue of the switch firmware which is comparable to the other programming contains a defect, which could be vulnerable, thus an upgrade is always important to solve such issues and the only way is staying on top of the latest updates.
Conclusion
The main intent of this research was to highlight on the wireless Network security threats and provide some preventive methods, which could be used. The wireless networks have now been deployed to the homes offices and many organizations are using them. There has been an increase in the threats particularly from the hackers who want to steals data, however these network have already security measures, which are embedded in them. Nonetheless, awareness of the users towards these threats and how to handle these threats without the need of the technical experts is still a big issue. This research call for more focus to be directed towards to those individuals who are not IT inclined in order to enhance their awareness to be able to make their own efforts in enhancing the security and at the same time mitigate the risk. It is important for one to be able to monitor on their connection of the network and look for any unusual activity. Keeping system up to date is highly encouraged especially the use of the latest patches. People are also advised to verify on the Access point firmware updates to be able to know those, which are associated to the security flaws before they implement them. There are many ways, which the hackers could compromise you, system, but taking these simple techniques is the starting point for preventing any attack could occur.
References
Choi, M. K., Robles, R. J., Hong, C. H., & Kim, T. H. (2008). Wireless network security: Vulnerabilities, threats and countermeasures. International Journal of Multimedia and Ubiquitous Engineering, 3(3), 77-86.
da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C. (2005, October). Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (pp. 16-23). ACM.
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications magazine, 40(10), 70-75.
Gleichauf, R. E., Randall, W. A., Teal, D. M., Waddell, S. V., & Ziese, K. J. (2001). U.S. Patent No. 6,301,668. Washington, DC: U.S. Patent and Trademark Office.
Gupta, V., Krishnamurthy, S., & Faloutsos, M. (2002, October). Denial of service attacks at the MAC layer in wireless ad hoc networks. In MILCOM 2002. Proceedings (Vol. 2, pp. 1118-1123). IEEE.
Karygiannis, T., & Owens, L. (2002). Wireless network security. NIST special publication, 800, 48.
Laeeq, K. (2011). Security Challenges & Preventions in Wireless Communications. International Journal of Scientific & Engineering Research, 2(5), 1-8.
Mashhour, A. S., & Saleh, Z. (2013). Wireless networks security in jordan: A field study. International Journal of Network Security & Its Applications, 5(4), 43.
Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53-57.
Shiu, Y. S., Chang, S. Y., Wu, H. C., Huang, S. C. H., & Chen, H. H. (2011). Physical layer security in wireless networks: A tutorial. IEEE wireless Communications, 18(2).
Zhang, Y., & Lee, W. (2000, August). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275-283). ACM