Skip to main content

Wireless Network Security


WI-Fi, thanks to its easy setup and widespread use, has made itself popular in many households. The wireless technology connects multiple devices, including computers, phones, and tablets, thus making it easier for them to ‘communicate’ with each other. So, for example, you want to control your living room computer whilst sitting comfortably in your bedroom, thanks to Wi-Fi, you can do that simply by installing a fewremote control apps on your smartphone. Moreover, you can snap a picture of yourself, send it to your laptop, and then send it to your printer for a nice printed pic. The possibilities are endless; however, they’re not without risks.

These days, more and more wireless networks fall prey to intrusions, hacking, and unauthorized usage due to the user’s failure to adopt necessary security measures.
 

Here at TechSource, we've compiled a nice list of all the essential steps you must take in order to secure your wireless network.


Make sure your Wi-Fi network is encrypted
This is the first and the most important of tips. Never, and I repeat never keep your Wi-Fi network open. In your router’s wireless settings section, you’ll find a bunch of options that will help you encrypt your network. Here’s some information about the different protocols you’ll need to choose from in order to keep the intruders at bay: 
WEP: Wireless Equivalent Privacy, or WEP is a security algorithm that was introduced by IEEE in 1999. Recognizable by the key of 10 or 26 hexadecimal digits, WEP has, since its introduction, been criticized for its flaws. Consequently, another security algorithm known as WPA was introduced, thus making WEP obsolete. Despite its widely publicized fallacies, WEP is still widely used, thus exposing the network to unwanted attacks. If you’re setting up a new network, it’s strongly recommended that you stay away from WEP and go with WPA2 instead. Furthermore, if you’re using WEP, be it your office or home network, it’s important that you switch to WPA2 as soon as possible.

WPA: Wi-Fi Protected Access or WPA is a security protocol designed to address the security fallacies in the aforementioned WEP protocol. Introduced in 1999, WPA wasn't completely adopted until early 2000s, since many routers faced compatibility issues whilst upgrading. WPA did, to an extent, address the many issues WEP faced; however, WPA too had a few vulnerabilities of its own. Soon, in 2004, IEEE introduced WPA2, which has, since then, become the most secure protocol of the lot. Since 2006, WPA2 has been made mandatory for all new devices, thus there’s very little chance that you won’t have the protocol in your newly purchased router. So, in short, if you’re creating a new wireless network, simply go for WPA2, as it is the strongest of the bunch.


Use a creative wireless network name
If you’re surrounded by basement-dwelling hackers and perpetual snoops, here’s a nifty little tip that will help keep them away from your network. Simply name your network’s SSID something like <> STATE POLICE, <> OFFICIAL MILITARY NETWORK, FBI Protected Access, Skynet, the list is endless. Just use your creativity and it might help you ward off those hackers for good.


Use a Firewall
Using a firewall is like having security guard at your door that keeps a watchful eye on everyone who goes in and out. By allowing only legitimate connections to pass through and blocking unwanted connections based on a certain set of rules, the firewall secures the network from a variety of threats that lurk around on the Internet. Nowadays, routers come with firewall built-in; however for those that don’t have any, setting up an extra firewall is not that hard. 

You can install firewall on individual Ubuntu or Linux Mint machines by typing in this simple command in the terminal (Ctrl + Alt + T):

sudo apt-get install gufw
For more info on how to use firewall on Ubuntu, read the manual.

Windows, on the other hand, comes with a built-in firewall that’s actually quite effective in keeping away the baddies. If you find installing firewalls on individual computers a tad tedious, you can convert an old PC into a firewall by using a firewall distribution.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principl...

10 Steps to Become a Top Information Security Professional: A Comprehensive Guide

In 2024, the demand for skilled information security professionals is higher than ever. As cyber threats continue to evolve, organizations around the globe are in desperate need of experts who can safeguard their critical data and systems. If you're aspiring to become one of the best in the field, you're in the right place. This comprehensive guide outlines ten essential steps to help you build a successful career in information security. From foundational education to advanced certifications, hands-on experience, and continuous learning, we'll cover everything you need to know to excel and stand out in this dynamic industry. Let's embark on your journey to becoming a top-tier information security professional. 1. Foundation in Computer Science Degree : Obtain a degree in computer science, information technology, or a related field. This will provide you with a strong foundational knowledge. Programming : Learn multiple programming languages such as Python, C++, Java, a...

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત...