Wi-Fi

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
m
Line 15: Line 15:
==Security==
==Security==
 +
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.<sup>[3]</sup>
 +
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If
 +
===WEP keys===
 +
===DNS Spoofing and Kaminsky Attack===
-
==Dir==
 
-
===Sub 1s===
 
-
===Sub 2s===
+
===Piggybacking===
 +
 
 +
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===
 +
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams.
 +
 
 +
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate.
 +
 
 +
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.
 +
 
 +
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.
 +
 
Line 32: Line 44:
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.
# "[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]". Retrieved on 2009-04-07
# "[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]". Retrieved on 2009-04-07
 +
# "[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]". Retrieved on 2009-04-07
==See Also==
==See Also==

Revision as of 05:55, 10 April 2009

Wi-Fi logo

Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.[1]

Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP Internet Protocol Suite. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.

The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification.


Contents

History

Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT & T (later Lucent & Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. [2]

Uses

Advantages and Challenges

Security

The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.[3]

The nature most wireless networks is to allow external access in order to maintain an degree of usability. If

WEP keys

DNS Spoofing and Kaminsky Attack

Piggybacking

The Wi-Fi Scam, Home Security Scam and Bluetooth Scam

'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams.

In the Wi-Fi Scam, the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate.

In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.

In the Bluetooth Scam, the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.


Other 802 Standards and Amendments

See: IEEE 802 Wiki


References

  1. Comer, D. E. (2006). Wi-Fi. Internetworking with TCP/IP (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.
  2. "Wi-Fi History". Retrieved on 2009-04-07
  3. "Pros and Cons...". Retrieved on 2009-04-07

See Also

External Links

--Hamilr3 00:51, 10 April 2009 (EDT)

Personal tools