While wire less internet networking is doubtless a great invention, it brings with it a fair amount of security concerns as well. The basic problem with having a signal broadcast throughout the office and home,
is that it is not easy to contain where exactly that signal could travel – it could travel to a neighbor’s living room , or, a hacker seeking insecure wire less internet connections, can get into the system from a car parked outside. Here Are A Few Basic Security Precautions to achieve a secure wireless internet connection:
First, Change The System ID
It is important to note that devices come with a default system ID called SSID or Service Set Identifier, or ESSID or Extended Service Set Identifier. SSID is a configurable identification which allows users to communicate with the appropriate base station. If there is proper configuration, only those user-clients who are configured with the same SSID would be able to communicate with those base stations having the same SSID. From the security standpoint, SSID acts as a very simple, single and shared password between clients
default SSIDs to breach and penetrate those base stations that are still in the default configuration stage. As it is easy for a hacker to guess what the default identifier for each manufacturer of wireless equipment is, the user would have to change it to something else- something that is unique, and not easily guessed.
Use A Strong Password
While choosing a password for your wireless internet , remember:
Not to use any personal information
Not to use any Real words
Instead, mix different character types
Create a pass phrase( think of a line from a favorite song for instance, and create a password by using the first letter of each word)
Change the Default Administrator Password
This is routine and good practice for all software and hardware. Make sure that the default password on your wireless route or on your access point is changed to something that is not very easily guessed.
Use A Safe Network And Restrict Unnecessary Traffic
Many of the wireless routers have inbuilt firewalls, that are not the most technically advanced, but help add one more line of defense. The user must read carefully the hardware manual to learn to properly configure the router. This can help restrict incoming or outgoing traffic to only those that he has approved.
Disable Identifier Broadcasting
The user does not have to broadcast to the world that he has a wireless internet connection - this is a sure invitation for hackers. He would do well to consult his hardware manual to learn how to disable broadcasting.
Enable Encryption
Wired Equivalent Privacy or WEP, and Wi-Fi Protected Access or WPA, help to encrypt the user’s data; so that only the intended recipient is able to read it. Of course, as with all security measures, this one can also be got round, but it does help to keep the casual hacker attacks at bay. While WPA does fix the security flaws in WEP, it is still subject to Denial –Of –Service (DOS) attacks. Yet, if possible, use WPA encryption.
Filter Mac Addresses
Some Access Points (AP) are equipped with the unique ability to filter trusted and tested MAC addresses. MAC addresses are considered unique addresses on the network. It is difficult to implement in today’s dynamic environment as it is tedious to configure the AP for each trusted client.
Patch and Protect the PCs
As something like a final line of defense, the user can install personal firewall software like Zone Alarm Pro, and anti-virus software. This anti-virus software must be updated regularly and at least once a week; as new viruses are being discovered daily. If one is using Microsoft systems, one could try using Windows Update to regularly keep the patches updated for security vulnerabilities.
Therefore in today’s dynamic world, where the internet is such an important medium of communication, it is important to achieve maximum wireless internet security and wireless computer security. There are a number of ways for achieving secure wireless internet connections and a secure wireless internet, which if correctly used, can help in protecting the system from hackers and spy ware programs.
0 comments:
Post a Comment