WLAN wireless than wired more security advantages of technical analysis (1)
Source: Internet
Author: User
KeywordsSecurity WLAN
Wireless networks were once considered a game of hackers and malicious attacks. However, wireless networks are fast becoming a more secure means of communication than wired networks. With VPN, WPA (Wi-Fi Protected Access) and 802.1x WPA2 encryption and identity technology, the theory that wireless LANs are equal to insecure LANs is outdated. In many cases, your wireless network is more secure than your wired network, said Bill Terrill, senior analyst at Burton Group, a market research firm based in Utah State Midvale. Terrill says the security vulnerabilities in wireless networks are generally not the result of product insecurity, but rather the result of network administrators not using the right tools to play their advantage. The biggest threat to WLANs, he says, is those network administrators who do not have security features open and monitor the network. It doesn't make sense for companies to have no wireless network security. Competence, vice president of Core Company and searchnetworking.com website expert Lisa Phifer, said their biggest threat was that WLANs could be used as a way to invade the company's wired network. Assessing these threats Phifer said that this concern suggests that deceptive access point detection systems are becoming increasingly popular to prevent employees inside the firewall from installing deceptive access points or to prevent employees from accidentally connecting to an access point near or under attack. She says deceptive access points can bypass existing network defenses. Phifer said that the main defensive measures for these activities by an agency were wireless activity monitoring and incident response. Currently, there are a number of wireless intrusion detection and defense systems that can help companies discover what is happening in the air, inside and around the corporate site. Some products also offer automated response capabilities, such as using wireless or wired containment technology to cut off suspicious deceptive access points or using local tools to track that access point, Phifer said. Hackers are largely less worried than they used to be. Protocols such as 802.11i, 802.1x, and WPA2 recent improvements in wireless security have eliminated the most feared threat of data confidentiality and provided some simple ways to implement tighter WLAN access management and user identification. However, these improvements have largely improved the safety of legitimate wireless activities, Phifer said. These improvements do not do anything to prevent deceptive access points, misconfigured sites, or denial of service attacks against the WLAN itself. Attackers can still exploit all of these vulnerabilities, such as using a denial of identity or a 802.1x log out packet storm to disrupt the normal operation of the WLAN. Terrill also agree with this view. ' Because of the safety of WLANs, hackers can no longer enter, ' he said. Hackers can't get into your network, but hackers can interrupt your network, which is a potential problem. Hackers interrupt yourOne way to network is to send disconnected packets to users of a corporate network. These packets force the user to log out at the same time and sign in at the same time. This will overload the server and cause network disruption. The threat is no longer an attempt to hack into the corporate network in a car park with a black ski mask, said Dave Danielson, a marketing vice-president at Blusesocket, a manufacturer of wireless network intrusion detection systems in Burlington, Massachusetts. Danielson added that most of the current intrusions into corporate wireless networks were caused by errors. If unauthorized users do not follow the proper process, they are harmful to the corporate network. People who do not use available tools are the biggest threats. 1 2 3 next page >> view full-text navigation page 1th: Assessing these threats page 2nd: monitoring Radio Frequency 3rd page: The key to successfully ensuring WLAN security: Technical analysis of WLAN wireless more security superiority (1) Return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.