Securing methods
A common measure to deter unauthorized users involves hiding the access point's name by disabling the SSID
broadcast. While effective against the casual user, it is ineffective
as a security method because the SSID is broadcast in the clear in
response to a client SSID query. Another method is to only allow
computers with known MAC addresses to join the network, but determined eavesdroppers may be able join the network by spoofing an authorized address.
Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping but it is no longer considered secure. Tools such as AirSnort or Aircrack-ng can quickly recover WEP encryption keys.Because of WEP's weakness the Wi-Fi Alliance approved Wi-Fi Protected Access (WPA) which uses TKIP.
WPA was specifically designed to work with older equipment usually
through a firmware upgrade. Though more secure than WEP, WPA has known
vulnerabilities.
The more secure WPA2 using Advanced Encryption Standard was introduced in 2004 and is supported by most new Wi-Fi devices. WPA2 is fully compatible with WPA.
A flaw in a feature added to Wi-Fi in 2007, called Wi-Fi Protected Setup,
allows WPA and WPA2 security to be bypassed and effectively broken in
many situations. The only remedy as of late 2011 is to turn off Wi-Fi
Protected Setup, which is not always possible.
0 comments:
Post a Comment