Security
Security has always been a big concern with wireless. Even today, with wireless a mature technology, I can walk around any apartment complex with a laptop and probably get onto someoneâs insecure wireless network. I know people who havenât paid for Internet access in years because their neighbors donât secure their wireless, allowing anyone to steal their bandwidth. While theft of Internet bandwidth is a moral and security concern, the bigger worry should be that unfettered wireless access allows strangers into an insecure network. Itâs one thing to be able to surf the Net for free. Itâs something else entirely to have access to all the computers on someone elseâs network.
Note
Even wireless security isnât enough. I travel a lot and spend a lot of time in hotels. As soon as I authenticate and gain access to the wireless in the hotel, I see scores of computers advertising themselves and their file shares. People have provided easy access to personal photographs, medical and financial records, and even sensitive password lists. Do yourself a favor and turn off the file shares on your laptop when you travel. Rumor has it there are plenty of bored nerds out there with nothing better to do than see what youâve got to share.
There are a few methods for securing a wireless network, which generally fall into two categories: authentication and encryption. Some of these methods include:
- MAC ID filtering
MAC ID filtering is a valid authentication method for small networks ...
Get Network Warrior, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.