Why should we pay more attention to wireless network security

Source: Internet
Author: User
Keywords Safe Fbi pbx.
Recently, the FBI has proven to people the fact that it is easy to analyze attacks on wired equivalent encryption to gain access to wireless networks that use this security protocol. According to the announcement, Jonathan Yarden is considering a test of the role of security in the wireless network, and based on the results of this test, he will make some suggestions on how to protect the safety of wireless networks. A few years ago, at a computer show in the very boom of the network concept unit, I stopped at a booth in front of a fast-growing network of highly-networked providers, and I asked them about the security of wireless networks for the provider's wireless network. Because 802.11 was a very popular wireless network specification at the time, I specifically mentioned the unsafe factors inherent in the 802.11 standard itself in these issues. The engineer at the booth at the time assured me that the company's wireless access technology was certainly very safe, but he could not explain to me how they implemented the security of the wireless network and did not explain why the technology was safe. The obvious point is that for me, as a potential client, I was able to ask such a simple question, and they were even ridiculous, and it seemed that he was very bad to me, and he didn't want to answer any of my questions except to get me out of the booth. Of course, the booth was carefully crafted, using the very popular A/V exhibition at the time, and every spectator who passed the booth was attracted to their very clowning dress. But their appearance belies their ignorance because they do not understand the insecurity that exists in their products. Although most of us are aware of the fact that superficial phenomena tend to deceive ourselves, even so, for the vast majority of people, appearances can still represent almost everything. So, I was very appreciative of the recent presentation of the FBI, a very formal institution, to people: they ended up demonstrating the fact that most wireless networks are unsafe. In addition, the agency claims that 802.11B is also an unsafe technology, although I was very concerned about the 802.11B technology a few years ago, it uses wired equivalent encryption technology to replace the standard 802.11a to access. This technology is considered to be a 802.11a security substitution technology, has been a strong pursuit of everyone. I really hope that this fact will enable people to believe that there must be sufficient information security knowledge. On the surface, it took the FBI just three minutes to demonstrate how to attack WEP encryption and gain access to secure networks. The FBI's findings should serve as a warning to organizations currently using wireless access technology, and this could be a reason to block the full use of wireless networks by some companies.In any case, companies that use wireless networks should be more aware of the role that security plays in wireless networks. Whatever the FBI demo can say, it's important for a company to understand the concept that no matter how secure your wireless network is, there is no real secure communication unless you deploy End-to-end encryption technology. " Although wireless technology has many advantages, wireless security can never be compared with the security of a wired network. Unfortunately, most companies tend to be more available in choosing availability and security, and many companies have deployed wireless access networks, especially in many software companies. In addition, in many cases, many organizations do not take into account the fact that, on many occasions, wireless access technology does not really have more advantages than the cable network. In fact, this could really introduce more new problems. I can't remember how many times I've seen it myself. Wireless networks that use 802.11b technology are in trouble due to the use of 2.4GHz of cordless telephones (often wireless PBX systems). Although I personally have a bias towards wireless network access technology, wireless networks are already in the corporate environment, and companies that are configuring wireless networks are growing. However, for companies that decide whether to use a wireless network, I strongly recommend that they use the following strategy: Use wireless network access technology only if they are not able to use wired network access, not as a simple replacement technology or as a trend to replace a wired network. And, in making a decision, security should be the first factor to consider, it is important to remember that the reason to retain the cable network, the factors to consider are multifaceted, not just security factors. For example, a wired network can handle very high speed bandwidth and can provide better security because they do not need to broadcast packets on the network. Of course, if bandwidth is not a major concern and you can be sure that wireless is the solution, the remaining problem is to make sure that the wireless access network does not rely on WEP technology as much as possible to take other, more secure measures. The two ways to achieve this are to use security protocols such as Point-to-Point Tunneling Protocol (PPTP) or second-tier Tunneling Protocol (L2TP), and to implement access control or some other authentication methods based on the user's name and password. If you use IPSec security protocols in a mixed network, you can gain access control and end-to-end encryption, which makes your wireless network more secure than your wired network. However, keep in mind that there are still some conflicts that need to be addressed in the current solution. Of course, some people may think that Wi-Fi Protected Access (WPA) provides 802.11i with all of the above security features, WEP will be replaced by WPA and can have a good conflict control function. Although this is a good news, 802.11i is of no use to anyone when planning to replace existing wireless network devices or upgrade existing wireless network firmware (even though this technology may be achievable). Also, keep in mind that no matter what security technology or security standards appear, there will always be people there trying to attack them, and WPA is no exception. In my experience, you can deploy Gigabit Ethernet at a very low cost, and this technology can provide better security and bandwidth without considering data encryption. If the wireless access network is your only option, take a look at the possibility of using security protocols such as PPTP/L2TP or IPSec on your existing infrastructure before you decide to replace or upgrade existing 802.11a and 802.11B devices. Although this is not a "very good" solution from a technical standpoint, it is a very useful practice and can prove to be safer than 802.11i. As for me, I'm still willing to use a wired network. Responsible Editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) Text: Why should pay more attention to the safety of wireless network back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.