Three major risks of WLAN wireless network security management and nine defenses (1)

Source: Internet
Author: User
Tags ftp site

Wireless networks are not so vulnerable. They provide rigorous protection measures and apply the latest encryption technology to fully protect our networks from internal and external attacks.

In the introduction to WEP encryption cracking, you will find that WEP cracking is much easier than you think. Anyone can use these tools to crack this encryption method, you only need to observe enough traffic on the network to understand the encryption key. However, wireless networks are not so vulnerable. rigorous protection measures and the application of the latest encryption technology can fully protect our networks from internal and external attacks. This article describes how to protect the wireless network.

For some people, they may think that the security of wireless networks is very complicated. Setting a secure wireless network may require very professional basic knowledge and complex settings. Some may also say: "I just used my computer to access the Internet and didn't do anything important. Why do I have to worry about security issues? ", Therefore, they will give up their security plans, which will lead to the wide opening of their network portals ". For the answer to this question, you may not have this idea after reading the following content.

I. Three major risks of WLAN with no security measures:

1. Exposed Network Resources

Once someone with ulterior motives connects to your WLAN over a wireless network, they have access permissions to the entire network, just like those who are directly connected to your LAN switch. In this case, unless you have taken some measures in advance to restrict access by unknown users to resources and shared documents on the network, intruders can do anything that authorizes users to do. On your network, files, directories, or the entire hard drive can be copied or deleted, or in other worse cases, such as key records, Trojan horses, spyware, or other malicious programs that can be installed into your system and manipulated by intruders through the network, the consequences can be imagined.

2. Sensitive Information exposed

As long as appropriate tools are used, WEB pages can be reconstructed in real time, so that the URLs of WEB sites you have browsed can be captured, some important passwords you entered on these pages will be stolen and recorded by intruders. If they are credit card passwords or the like, you will know what is going on.

3. Act as a stepping stone for others

In foreign countries, if an open WLAN is used by intruders to transmit pirated movies or music, you are very likely to receive a letter from RIAA's lawyers. What's more, if your Internet connection is used by someone else to download child pornography or other inappropriate content from an FTP site, or use it as a server, you may face more serious problems. Moreover, open WLAN may also be used to send spam, DoS attacks, or spread viruses.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.