Result
Sabtu, 27 Juni 2009
wireless networks are somewhat fewer procure that wired networks , because of the fact that one can easier access the network provided he is in the coverage area of the access points. of lesson , there are various barriers in any wireless network that from the nicely called primary security which can stay the unintended access of persons that are alien to the network and that are merely situated in the coverage area. but when it comes to a trained hacker that wants to access that network , these primary defences won't furnish them too a Good Deal Of headaches.
The security methods that own been provided to wifi networks assure a rather abject security smooth , and this is why extra security measures require To be taken. in june 2004 , a novel wireless general named 802.11i has been approved , and this general does improve wireless security. the primary wireless security is assured by the following included functions:
- ssid
- wep
- media access control
Ssid is a code that defines the belonging to a sure access point of a wireless network. all wireless devices that lack to communicate through a network require To own their own ssid , which volition own the same worth as the one originate in the access points' setting in instruct to create a legitimate connection. normally , an access point sends out its ssid every annex of seconds. this way of operating can be stopped nicely that a person with bad intentions can not discover the ssid automatically and thus the access point. but , because ssid is included in every wireless sequence's beacon , it is very easy to detect provided a Person has monitoring equipments that allows him to find out its worth and to annex to the network.
Wep can be employed to ameliorate the problem of continuously transmitting the ssid through encrypting the traffic between the wireless clients and the access point. this is done by creating a shared password. the access point transmits to the wireless customer a catechize that the customer require To send back encrypted. provided the access point can decrypt the client's retort , it has the evidence that the customer has the right wireless key and has a right to enter the network. wep has two encrypting possibilities: a key at 64 bits or at 128 bits. of lesson , wep doesn't assure the ultimate security smooth. a hacker that is equipped with the before mentioned monitoring devices can receive and roster at primary the catechize and then the encrypted retort , and from here on he can determine the network key.
Mac verifying can also raise the network's security , provided the administrator uses mac screed filtering to enter the network. this means the access pint is configured with the mac addresses of the clients that are allowed to enter that network. provided a Person else captures an screed and the uses it to enter the network , any access point or router has a figure page where you can see the number of connections from a particular screed , nicely you can determine whether a Person else is related to your network or not.
Label: Security
0 komentar:
Posting Komentar