In: Computer Science
intrusion Detection course
a long and comprehensive explanation by typing please
Why is wireless security important?
Explain the significance of wireless security.
Name 3 attacks relevant to wireless security and how to protect against them.
The network of wireless does not end at just an office or a home. A network has the capability to extend over three hundred feet through the air. And if this network is not secured properly, then outside businesses people, nearby buildings or offices can have access to it. Even though having the Wi-Fi in a small room still nearby people passing by and the neighbours can try to connect and access it. So, it becomes vital to take appropriate preventive measures in securing it. The people who intend to connect with the network can do the following activities:
· View files on a laptop or computer, and spread the virus.
· Monitor on websites we visit, extract usernames and passwords, read all emails.
· Slower down the device and speed of internet connection.
· Send spam or do illegal activities with the connection.
By considering all the above points, it is very much necessary to secure the wireless connection to save our crucial data.
Significance of wireless security:
Wireless security prevents unauthorised user in accessing our wireless network, avoid data stealing. Precisely, it ensures the protection of wireless network. Especially in an intrusion detection system, this is most necessary because attackers are always in a queue to hack in and damage the system. Effective security of wireless network is very critical. For these various policies are developed, and all these depends upon the makers what security mechanisms must be included so that it won.t compromise system’s security.
Three types of wireless security attacks are:
· Jamming – It is also referred to network interference. It aims to disrupting the network. Having wireless feature, it becomes difficult to avoid interference. Interference can be caused even by microwave or Bluetooth headphones. For protection from such attack’s investment must be made in spectrum analyser, that will boost the access points power and use of different frequencies.
· Evil Twinning - In this type of attack, a twin of network is created. Attackers get access points(wireless) and configure same as existing network. This will create confusion in original access point. For stopping this evil twinning data encryption should be used.
· Rouge access point – It is access point that is unauthorised in the network. This attack makes whole network open to DoS attacks, ARP poisoning, packet captures and more. For protection from these attacks network access controls or points can be used.