I. Wireless intrusion threats
Like wired LAN, wireless LAN is also under many security threats. Wireless LAN brings great convenience to users, and security issues are also worth noting. It also provides security problems that do not exist in wired networks. Illegal users can connect to the wireless network without physical connection, and anyone can use the device to snoop broadcast packets transmitted by RF carriers.
Wireless networks provide convenience while ensuring security.
In general, the security threats of Wireless LAN come from the following aspects:
1. For convenience, the configuration of Wireless AP or wireless router in many default cases has almost no security measures, so it is likely to be infiltrated by other users or conduct DoS attacks) such attacks.
2. For most home users, it is often considered that all computers in the wireless LAN are placed in the firewall, Which is safer. Once an illegal user breaks the firewall, the internal firewall will be virtually empty.
3. For the Infrastructure (centralized Wireless Network) that uses a Wireless AP or wireless router for central access, if the wireless network card uses the "ANY" Method for Automatic Login, then, a neighbor or illegal intruder only needs to build a wireless network centered on a Wireless AP or a wireless router nearby, and it is very likely that your wireless network adapter will automatically log on to the wireless network, security risks.
4. In a wireless LAN, if a user discloses public data of the wireless LAN, other illegal users can easily log on to the network and cause security threats. In addition, for a wireless LAN in a household, it cannot ensure that there are third-party users in other household users.
5. Cracking wireless network security protocols is not difficult for hackers. For example, the vulnerability in the Wired Equivalent security protocol (WEP) used in the IEEE 802.11 Network can be cracked, and the malicious Media Access Control (MAC) Address disguise also exists in the Wired Network.
6. Attacks and intrusions from the Internet are the same as those from wired networks.