Eliminate security risks and deny wireless intruders (1)

Source: Internet
Author: User

I. Wireless intrusion threats

Like wired LAN, wireless LAN is also under many security threats. Wireless LAN brings great convenience to users, and security issues are also worth noting. It also provides security problems that do not exist in wired networks. Illegal users can connect to the wireless network without physical connection, and anyone can use the device to snoop broadcast packets transmitted by RF carriers.

Wireless networks provide convenience while ensuring security.

In general, the security threats of Wireless LAN come from the following aspects:

1. For convenience, the configuration of Wireless AP or wireless router in many default cases has almost no security measures, so it is likely to be infiltrated by other users or conduct DoS attacks) such attacks.

2. For most home users, it is often considered that all computers in the wireless LAN are placed in the firewall, Which is safer. Once an illegal user breaks the firewall, the internal firewall will be virtually empty.

3. For the Infrastructure (centralized Wireless Network) that uses a Wireless AP or wireless router for central access, if the wireless network card uses the "ANY" Method for Automatic Login, then, a neighbor or illegal intruder only needs to build a wireless network centered on a Wireless AP or a wireless router nearby, and it is very likely that your wireless network adapter will automatically log on to the wireless network, security risks.

4. In a wireless LAN, if a user discloses public data of the wireless LAN, other illegal users can easily log on to the network and cause security threats. In addition, for a wireless LAN in a household, it cannot ensure that there are third-party users in other household users.

5. Cracking wireless network security protocols is not difficult for hackers. For example, the vulnerability in the Wired Equivalent security protocol (WEP) used in the IEEE 802.11 Network can be cracked, and the malicious Media Access Control (MAC) Address disguise also exists in the Wired Network.

6. Attacks and intrusions from the Internet are the same as those from wired networks.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.