Protecting Wireless Network
Protecting your wireless network from unauthorized access is the utmost important to prevent personal information from being stolen without being notice.
Set Strong Password
When setting a password to connect to the wireless network, make sure that the password is strong. The longer the password the less likely it is for a snooper to crack the password. Make sure that the password does not include word in the dictionary. Hacker uses a bot that would guess all the word in the dictionary. The password should include capital, number, symbols, and ect. Password is the key into your wireless network. Think of a password as a master key for every entrance into your house and room. Once the key have been cracked, the intruder can do what ever it please.
Use Strong Encryption
WEP (Wired Equivalent Privacy). WEP was the encryption scheme hastily thrown together as a pseudo-standard by vendors who were in a hurry to start producing wireless equipment before the protocol standards were finalized. As a result, it was later found to have holes that are easily exploitable by even a novice attacker.
WPA (Wi-Fi Protected Access). WPA was created to improve on or replace the flawed WEP encryption. WPA provides much stronger encryption than WEP and addresses a number of WEP weaknesses.
TKIP (Temporal Key Integrity Protocol). TKIP is the underlying technology which allows WPA to be backwards compatible with WEP and existing wireless hardware. TKIP works in conjunction with WEP and institutes a longer key, 128-bits, as well as changing the key on a per-packet basis to make it exponentially more secure than WEP alone.
EAP (Extensible Authentication Protocol). With EAP support, WPA encryption provides more functionality related to controlling access to the wireless network based on PKI (Public Key Infrastructure) keys rather than filtering only based on MAC addresses which can be captured and spoofed.
Disable Broadcast of SSID
Disable broadcast of SSID hide the your wireless network. The only computer that can access the wireless network is the computer that have connect to the wireless network before. A software is required for an outsider to see the hidden wireless network.
- Set strong password or passphrase
- Use strongest encryption
- Disable broadcast of SSID
- Lower frequency range
Set Strong Password
When setting a password to connect to the wireless network, make sure that the password is strong. The longer the password the less likely it is for a snooper to crack the password. Make sure that the password does not include word in the dictionary. Hacker uses a bot that would guess all the word in the dictionary. The password should include capital, number, symbols, and ect. Password is the key into your wireless network. Think of a password as a master key for every entrance into your house and room. Once the key have been cracked, the intruder can do what ever it please.
Use Strong Encryption
- Wired Equivalent Privacy (WEP)
- Wi-Fi Protected Access (WPA and WPA2)
- WPA with TKIP or EAP
WEP (Wired Equivalent Privacy). WEP was the encryption scheme hastily thrown together as a pseudo-standard by vendors who were in a hurry to start producing wireless equipment before the protocol standards were finalized. As a result, it was later found to have holes that are easily exploitable by even a novice attacker.
WPA (Wi-Fi Protected Access). WPA was created to improve on or replace the flawed WEP encryption. WPA provides much stronger encryption than WEP and addresses a number of WEP weaknesses.
TKIP (Temporal Key Integrity Protocol). TKIP is the underlying technology which allows WPA to be backwards compatible with WEP and existing wireless hardware. TKIP works in conjunction with WEP and institutes a longer key, 128-bits, as well as changing the key on a per-packet basis to make it exponentially more secure than WEP alone.
EAP (Extensible Authentication Protocol). With EAP support, WPA encryption provides more functionality related to controlling access to the wireless network based on PKI (Public Key Infrastructure) keys rather than filtering only based on MAC addresses which can be captured and spoofed.
Disable Broadcast of SSID
Disable broadcast of SSID hide the your wireless network. The only computer that can access the wireless network is the computer that have connect to the wireless network before. A software is required for an outsider to see the hidden wireless network.