Wireless network systems can cause serious security problems if they do not take appropriate security measures, whether the wireless system is installed at home or in the office. In fact, some providers of Internet services for residential areas have banned users and other unauthorized people from sharing networking services in their service agreements. An insecure wireless network can cause services to be lost or exploited to launch attacks on other networks. To avoid some of the similar wireless network security vulnerabilities, here we introduce several convenient wireless network security techniques.
Using the Wireless Encryption protocol
Wireless Encryption Protocol (WEP) is a standard method of information encryption on a wireless network. Today's production of wireless routers almost all provide users with the choice of encrypted data, the proper use of this feature can avoid their own bank account details (including passwords, etc.) will not be intercepted by malicious people. However, it is important to note that the Wi-Fi Protected Access technology (WPA and WPA2) is more robust than the WEP protocol and therefore has a greater role in securing wireless communications. The
uses MAC address filtering
Under normal circumstances, wireless routers and access points have the ability to prevent unknown wireless devices from connecting to the network. This function is achieved by comparing the MAC address of the device that is trying to connect to the router and the MAC address of the device saved by the router. Unfortunately, this feature is usually turned off when the router is out of the factory, because it requires some effort from the user to make it work correctly, otherwise it will not be able to connect to the network. Therefore, by enabling this feature and simply telling the router the MAC address of the wireless device in the unit or home, we can prevent others from embezzling their Internet connection to enhance security.
But do not rely entirely on this measure, or it can be said that using MAC address filtering is not a panacea for hackers who are hell-bent on cloning MAC addresses and trying to connect to a user's wireless network, but you should use this measure to reduce network risk.
Setting a security password
Setting a password for wireless Internet access is critical. Choosing a strong password helps to secure your wireless network, but do not use the default password that accompanies the wireless router, or use a word that can be easily detected in a dictionary or a family's birthday.
Turn it off when you are not using the network
If a user's wireless network does not require 24 hours of service per week, you can reduce the chance of being exploited by the hacker by shutting it down. While many companies are not able to leave the network, it may not be realistic to put this recommendation into practice. But one of the most significant improvements to a system's security is to close it directly. Because no one can access a service that does not exist or open.
Monitors network intruders
UsersNetwork activities should be monitored and the trend tracked. The more users, especially administrators, learn about malicious hacking, the easier it is to find a coping strategy. Network administrators should collect logs about scans and access attempts, and make use of existing large numbers of statistics generation tools to make these logs more useful information. You also set up a log server to send alerts or e-mail to an administrator when it discovers that a malicious activity does occur. The author believes that understanding the danger is equivalent to winning half of the battle. The
Changes the service Set identifier and prevents the SSID broadcast
Service Set Identifier (SSID) as the identity identifier for wireless access, which the user uses to establish a connection to the access point. This identity identifier is set by the communication device manufacturer, and each vendor uses its own default value. For example, 3COM devices are used "101". As a result, hackers who know these identifiers can easily enjoy your wireless service without authorization. You need to set up a unique and unpredictable SSID for each of your wireless access points.
If possible, you should also prohibit your SSID from broadcasting outward. In this way, your wireless network will not be able to broadcast to attract more users, of course, this is not to say that your network is not available, but it will not appear in the list of available networks.
allows internet access only for certain periods of time
Some of the newest wireless routers now produced allow users to limit access to the Internet to certain periods of the day. For example, if you don't need to access the Internet from Monday to Friday between 8 o'clock in the morning and 6 o'clock in the afternoon, simply turn on your router settings to disable these time slots!
Disabling Dynamic Host Configuration Protocol
This seems like a strange security policy, but it makes sense for wireless networks. With this strategy, you will force hackers to crack your IP address, subnet mask, and other required TCP/IP parameters. Because even if a hacker can use your wireless access point, he needs to know your IP address.
To disable or modify SNMP settings
If your wireless access point supports SNMP, you need to disable it or modify the default public and private identifiers. If you don't, hackers will be able to use SNMP to get important information about your network.