Note From The Author, Gus
Thank you for visiting our site. I hope the information herein was useful to you. Should you have additional PC-related questions or problems, click for help: FREE Tech Support Request. Stop searching and get solutions!
In an earlier article about wireless security, we discussed, generally, aspects of Hotspot connections and wireless networks security concerns, since most do not offer Wi-Fi protected access. Though we touched on a number of protocols, I thought it may be worth the time to provide a closer look at mobile security, wireless encryption concerns as well.
Wireless technology, in terms of proficiency and usefulness, has made great strides to catch up with the demand of wireless communication devices. Whether it be for socializing, or for business, we are ever-pursuing a way to makes things more convenient, or get tasks completed faster, and wireless connectivity has made that a reality.
Although the use of mobile devices and wireless communications has become increasingly popular, we seldom think about any of the security issues. Not only has the activity level risen in wireless hacking, wireless security overall has been lagging well behind. This opens the door for more deliberate malicious activity and theft of private information and personal identification.
In this article, we would like to present an overview of wireless security protocols, how and where we may use each.
WEP Security: Acronym for Wired Equivalent Privacy, this protocol was basically the first encryption method provided to consumers for wireless communications, and mainly used in home-based wireless devices, such as routers and access points. Though this protocol can be used the 64-bit, 128-bit, 256-bit encryption, it is really limited to Internet communication protocols 802.11b/. WEP data encryption method is seen as the lowest possible security you could choose, as it can be easily hacked. In most cases, the hacker can simply create their own security key and be allowed full access.
WPA Security: The better protocol to go with for securing wireless connections. The most-recent version, WPA2 supersedes all others and would probably be considered your best choice, and uses 802.11i communications protocol. The use of strong authentication measures and data encryption, with open, or shared key authentication.
For mobile browsing, WTLS was developed; short for ‘Wireless Transport Layer Security’. You will find most smartphones to use this protocol in WAP-enabled browsers. WAP is an acronym for ‘Wireless Application Security’, and uses public-key cryptography for mutual authentication and data encryption, rather than strictly open system authentication. Working in tandem, they can provide good security for mobile devices, however, if improperly implemented, it can expose the device to possible attacks.
Securing your wireless connection is more than simple wireless encryption selections, it involves a number of various aspects. Though not required by most wireless LAN connections, you may want to look at confirming user access, utilize a protocol that requires dynamic data encryption (encryption provided to data en route), disable DHCP on any WAP-enabled system front-end, or at least, place it behind a firewall, install antivirus and spyware protection software on all devices, and update definitions frequently. Restrict unauthorized WAP connections; basically, this would be using MAC Address Filtering.
Here’s a real good read about the growth of wireless communications – In this Network World article, the independent author of ‘Wireless: My, how you’ve grown‘, says, “Mobility is at the core of pretty much everything. At least some Star Trekkian fantasies have become reality; just witness a healthcare worker with a Vocera communications badge. ” It just shows how important it is for security to catch up, as we continue to increase our use of wireless communications.