What are the key points to ensure wireless network security?

Source: Internet
Author: User

Wireless networks are more vulnerable to intrusion than wired networks, because the computers at the attacked end do not need to be connected to the computers at the attacked end, attackers can access your internal network and access resources as long as they are within the valid range of a wireless router or repeater in your domain.

During the Olympic Games, when watching or directly participating in the event reports connected to wireless networks in public, what are the key points to protect the devices in your hands? The following describes different wireless access methods in detail:

Wi-Fi

In terms of design, the main force that Wi-Fi relies on in terms of security is WEP (wired peer-to-peer Security) encryption. However, such protection measures have proved to be inadequate. More importantly, WEP encryption has some problems. WEP defines a 24-bit field as the initialization vector (IV), which can be reused.

How to Make Wi-Fi more secure

1. Pay attention to the SSID. The SSID is the identifier of a wireless network. If possible, the default SSID of the device should not be used. In addition, the closed Wi-Fi network does not respond to wireless devices that set the SSID to Any, and does not broadcast the SSID in the wireless network, this can reduce the possibility of wireless network discovery. 2. Reinforce WEP: limited WEP encryption is at least much better than not using WEP. Therefore, the basic principle is to set the WEP Key as high as possible. 3. Regular key replacement: not all environments need to change the key every week, but you should consider changing the key at least once every quarter. With the development of time, the security of a wireless network without changing the key will be greatly reduced. 4. Filter computers: by specifying a specific address set, you can ensure that only authorized computers can access the wireless network.

BlueTooth)

Although the Bluetooth specification has been well considered for security at the beginning of its launch, the security of Bluetooth applications is still not perfect due to the impact of various factors such as vendor implementation and user habits. Some methods have been found to break through the security mechanism of Bluetooth devices. Theoretically, an invisible bluetooth device cannot be found, but this is not the case. Some software tools, including redfang (a hacking tool), can be used to discover Bluetooth devices in invisible mode.

How to Prevent Bluetooth attacks

1. Do not enable it if you do not need to use it. For Bluetooth devices, you should always remember to disable it whenever you do not need a Bluetooth connection. 2. High Security level: there are usually three high and low security levels for Bluetooth devices. The highest level is device security. It must be noted that a device-Level Secure bluetooth device can also encrypt data. The highest possible security level is very important. 3. Pay attention to pairing: because the process of cracking the Bluetooth PIN code requires forced re-pairing, pay special attention to suspicious pairing requests. In addition, try to remember the matching information when possible, instead of pairing each connection.

UWB

The technical features of UWB determine that this technology is relatively secure. This technology was required to have extremely difficult eavesdropping features during military development. The characteristics of ultra-wideband transmission are that the pulse signal cycle is extremely short (often in nanoseconds or second-level), and the transmit power of these signals is lower than the noise level of traditional radio receiving equipment, therefore, it is difficult to use a common RF receiver. In addition, the private keys in the UWB are encrypted using AES (Advanced Encryption Standard), and the anti-interference mechanism and self-recovery capability are provided to combat various transmission failures. Therefore, we can establish a very secure and reliable transmission system using the UWB technology.

No obvious security defects have been found in the UWB technology, and more problems may be found after a large number of UWB products are available.

WiMAX

The new 802.16d standard of WinMAX provides additional security protection by defining a confidentiality sub-layer in the MAC layer. The confidentiality sub-layer mainly includes two Protocols: Data Encryption encapsulation and key management. The Data Encryption Encapsulation Protocol defines the encryption algorithms and methods supported by 802.16d, while the key management protocol defines how keys are distributed from base stations to user terminals. In addition, the DES algorithm used by 802.16d only supports 56-bit keys. The length of this key is insufficient for attackers to crack the key today.

At this time, you must be careful not to destroy your firewall: it is almost certainly true that you have installed a firewall for both wired and wireless networks. However, if you do not place the wireless system access point outside the firewall, the firewall configuration will not help. Make sure that this is not the case. Otherwise, you should not create a necessary barrier for the network, but also open a convenient channel from the existing firewall.

Related Articles]

  • How to Ensure wireless network connection security

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.