ALL >> Computers >> View Article
How To Secure A Wireless Network In Home Or In The Office
Wireless networking offers some benefits that are apparent - no wires and the most obvious is portability to allow you to surf the Internet by your pool side, your fireplace, or anywhere else in your house. Or you can play online game wirelessly with your XBOX console in the comfort of the living room without the clutter of the wires. Like the wired LAN, wireless network is also vulnerable to any types of security threats such as Denial of Services (DoS); Spamming; spoofing; Sniffers. The question is how to secure a wireless network?
Security might be the last thing on your mind when setting up a wireless network. As a general rule, you should employ a level of security that corresponds to the sensitivity of the data on your network. Unlike wired systems, which can be physically secured, wireless networks are not confined to the inside of buildings. They can be picked up as far as 1,000 feet outside of the premises with a laptop and a hi-gain directional antenna.
Wireless security is inherently easier to crack than wired networks because there's no need for a physical connection to your network. Data transfer ...
... occurs over the airwaves, and that makes accessing it easier. Therefore, a systematic approach in securing a wireless network is absolutely a must including:
1. Securing the wireless connection against unauthorized users within the network coverage
2. Securing the end point of the network facing the internet.
Securing a wireless connection
There are couple of techniques you can use to secure a wireless connection, wireless encryption and MAC address filter. The first generation of wireless connection security is WEP - Wireless Equivalent Privacy which was intended to provide confidentiality comparable to that of a traditional wired network. WEP is the wireless security which is embedded to mostly the 802.11b and g standards. Unfortunately the researchers had found several weaknesses in this WEP system.
The latest industrial wireless security is Wi-Fi Protected Access (WPA and WPA2) which is a certification program created by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance.
How to secure a wireless network using WPA/WPA2? Firstly you should select the wireless devices that support WPA/WPA2 encryption such as WRT610N wireless router by Linksys or NETGEAR WNDR3700 Rangemax router. In Windows platform, there are two options you can configure when you are using WPA/WPA2 encryption: using Windows Connect Now and manual configuration.
If your wireless router doesn't support WCN (Windows Connect Now), then you need to manually configure the router. Logon to the router via your web browser by accessing the default router address, and locate the router's configuration page. Consult with the manual book that comes with the router. If your router supports Windows Connect Now, you can quickly and easily configure the router by following the instructions in Using Windows Connect Now technology.
If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly.
MAC Address Filter
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network's radius. Select Enabled/Disabled the Wireless MAC filter in the router's configuration page, default setting is disabled. You should enable the setting to configure the wireless MAC filter either prevent or permit access. You should know the MAC addresses of the wireless device to be included in the permit or prevent MAC address record. The MAC address on wireless network adapters is typically printed on the network adapter's underside.
But if your Wi-Fi adapters (PCI wireless adapters) have been installed in the desktop PCI slot, you cannot recognize the physical address visually. In a command line prompt (press Windows + R keys simultaneously and type in CMD and press enter) type ipconfig /all command and you can find the device physical address.
Change the default wireless network name or SSID
Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Each wireless product has their own default SSID as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information because this information may be available for anyone to see when browsing for wireless networks.
Change the default password
Wireless routers / AP have a default username and password set by the factory. Mostly their default username is admin or some have their default password as password. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device's password so it will be hard to guess.
Securing the end point of the network facing the internet
How to secure a wireless network from any types of internet threats? It depends on the wireless routers security features, but typically all the wireless routers support dual-firewall features: NAT and SPI which is enabled by default. NAT (Network address translation) helps you to hide the private network from the public network (the internet), and the (SPI) stateful packet inspection will examine the incoming packets thoroughly for any false positive packets.
Ki Grinsing was graduated from ITS Surabaya with the additions of MCSE and CCNA certifications. He has long years of working experience in IT. For a complete article, please visit: How to secure a wireless network and how to troubleshoot a wireless network
Add Comment
Computers Articles
1. Rental Management Software: A Complete Solution For Car, Property, And Coworking SpaceAuthor: RentAAA
2. The Ai Revolution: What’s Coming In 2025
Author: Ben Gross
3. The Rising And Falling Trends Of Graphic Card Prices In 2024
Author: Alahdeen
4. What Is Test-driven Development And Which Three Rules Does It Follow?
Author: Byteahead
5. What Is Web Application Architecture?
Author: goodcoders
6. Understanding How Wifi Works: The Wireless Connection Process Explained
Author: Kr
7. What’s Coming In Cybersecurity For 2025?
Author: Ben Gross
8. Hire Magento Expert In India
Author: Yuvraj Raulji
9. Discovering Everything About C15 Power Cables
Author: Jennifer Truong
10. Want To Get Long-distance Power? Time To Grab Extension Power Cords
Author: Jennifer Truong
11. Best Android Development Tools To Use
Author: Best Android Development Tools To Use
12. Choosing The Right Kansas City Web Design Partner For Your Business Success
Author: naviworld1h
13. The Importance Of Choosing The Right Kansas City Ecommerce Developer And Logo Design Expert
Author: naviworld1h
14. Top Mobile App Companies And Developers In Kansas City
Author: naviworld1h
15. Boost Your Business With A Leading Web Design Company In Kansas City
Author: naviworld1h