The Internet (a.k.a The Mother of All Networks) has become the biggest threat to the security and privacy of its users, still, the number of users are rising by millions every year.
Earlier it is said that the Safe computer is the one that isn't networked at all i.e. has no internet connection but have a look to this Computers can be hacked without any Internet Connectivity.
Your data is more at risk than on Wired LANs too. Your system can be compromised via your Network Cards also. However, To hack your systems into WLAN (Wireless LANs) by bypassing the security installed on the Router is only in the hands of a professional hacker.
Classification of Vulnerabilities to WLANs:-
- Unauthorized Access Threats
- Denial of Authorized Access
The first one involves threats from hackers and their created Trojans or Viruses to get into your network and have the unauthorized access to your computer systems.
The other one is like a Denial Of Service Attack(DoS Attack) in which your network got jammed or affected by some other source.
So, How to overcome the threats of Unauthorized access-
- Dont Broadcast SSID's : Wireless APs (Access Points) have the fully functional feature to stop broadcasting SSID's. This will affect the third party users to not maintain access to your network. On its worst side, Hackers can still detect your AP SSID with the penetration tools pre-installed in Operating Systems like Kali Linux (Most advanced OS for the security researchers and Penetration Testers).
- Use IP Access Control : Use this feature if your network consists only few devices, make sure to provide access to only those devices. In that case your AP would only respond if your specified IP wants access to Internet not other than that. Or you can do is set the computer's MAC address to the allowed devices list. Find your MAC by "ipconfig /all "a command line utility.
- WEP or WPA2 : It is Wired Equivalent Protocol used as an encryption standard for 802.11b networks. When purchasing Modems make sure that it supports latest Security techniques.
Be careful in case of wireless security, to make hackers keep trying to penetrate your network without any successful attempts in their hands.
Source:- Digit Magazine
No comments:
Post a Comment