Chapter 2: Securing a Wireless Network
In This Chapter
Reviewing the threats posed by wireless networks
Enabling the basic security features of a wireless network
Locking down your network with MAC address filtering
Before you dive headfirst into the deep end of the wireless networking pool, you should consider the inherent security risks in setting up a wireless network. With a cabled network, the best security tool that you have is the lock on the front door of your office. Unless someone can physically get to one of the computers on your network, he or she can’t get into your network. (Well, I’m sort of ignoring your wide-open broadband Internet connection for the sake of argument.)
If you go wireless, an intruder doesn’t have to get into your office to hack into your network. He or she can do it from the office next door. Or the lobby. Or the parking garage below your office. Or the sidewalk outside. In short, when you introduce wireless devices into your network, you usher in a whole new set of security issues to deal with.
This chapter explores some of the basic security issues that come with the territory when you go wireless.
Understanding Wireless Security Threats
Wireless ...