123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Guidelines For Designing Security For 802.lib Wireless Networks

Profile Picture
By Author: Jasmine
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

To design wireless security for MCSE 2003 exams networks, you must design security for wireless clients and provide a more secure network topology and proper wireless access point configuration to secure the wireless network from wireless attacks. The following sec?tions provide the guidelines that you need to do these things.
Wireless clients also need defenses against attacks that might be directed towards them. Remember, enabling a ?wireless client is similar to plugging it into an untrusted wired network. You do not know who might be near enough to attack the wireless cli-ent, either through a connection to the wireless AP or by making a direct connection to the client. Use the following guidelines to design security for clients:
Use personal firewalls on wireless clients.
Use a VPN client to connect to the network using a wireless client. Doing this adds another layer of encryption and authentication.
Secure the client. Ensure file and print services are turned off.
Use hardening techniques to secure the client operating system.
Attacks against ...
... WEP Such an attack might be mounted and be successful at obtaining the MCSA 2003 exams encryption keys. If the keys are obtained, an attacker can decrypt wireless data. In addition to gaining sensitive information, the attacker might also obtain information necessary to join the wireless network protected by WEP.
Jamming or Denial of Service (DoS) attacks Just as a DoS attack against a wired network can work by overloading the network with too much activity, sim-ilar attacks can make a wireless network unavailable.
Disruption Other devices—such as baby monitors, cordless phones, and Blue-tooth devices work at the same 2.4 GHz frequency and can disrupt the wireless network.

Many of the threats listed in the "Threats Introduced by Wireless Networks" sec-tion are widely known, but many network administrators are not aware of them. You can locate more information at the following locations. If you find links for attack tools and want to download them to learn how to defend your network, consider the source and protect your network and client.

Netstumbler scans for wireless networks and logs SSIDs and the access point's MAC address. If you add a GPS receiver, it logs the latitude and longitude of the AP. You can turn off the broadcast of CCNA exam SSIDs by the AP to hide the access point from Netstumbler.

Total Views: 313Word Count: 380See All articles From Author

Add Comment

Computer Programming Articles

1. Which Are The Best Java Coding Classes In Bhopal?
Author: Shankar Singh

2. Warehouse Management In Zambia: Essential Features To Look For
Author: Doris Rose

3. Ecommerce Web Design And Development In Melbourne With The Merchant Buddy
Author: themerchantbuddy

4. Why Website Maintenance Is Crucial For Business Success
Author: Yogendra Shinde

5. Boost Your Business With Smart Invoice Pos Software In Zambia
Author: Cecilia Robert

6. How Stablecoin Development Ensures Stability And Security?
Author: Michael noah

7. Công Cụ Tính Chiều Cao Chuẩn Từ Minbin Tool: Đo Lường Và Cải Thiện Chiều Cao Hiệu Quả
Author: KenJi123

8. How To Make A Courier App For Courier Delivery And Tracking Service
Author: Deorwine Infotech

9. Reputation Management In The Digital Age: Protecting And Enhancing Your Law Firm’s Image
Author: jamewilliams

10. What Features Should I Look For In Wordpress Ecommerce Plugins?
Author: Rocket Press

11. Staying Updated With The Latest Gaming News
Author: Next Tech Plus

12. Game Development: Evolving Technologies And New Horizons
Author: Rick John

13. Why Svelte Is The Most In-demand Framework For Web Development?
Author: Why Svelte Is The Most In-Demand Framework For Web

14. Maximizing Ebay Sales With Maropost/neto And Pursuit Info Solutions
Author: rachelvander

15. The Importance Of Software Testing: Ensuring Quality In Development
Author: John Mathew

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: