The Essentials of Wireless Security

Written by Daniel Robson


With wireless networks proliferating it is becoming more important than ever that sufficient security measures are put in place. And yet many people, especially those new torepparttar technology or computers in general, are just not aware ofrepparttar 135826 dangers of not properly securing a wireless network.

Typically ‘normal’ users of products such as wireless routers dismiss any security concerns as only really being applicable to commercial concerns. After all, who would be interested in a small local set-up of two, maybe three computers? You may be surprised. There are many horror stories circulating about unsecured wireless networks, and unfortunately there is a grain of truth in most of them. The most common form that a danger to a private network can take is known as variously as ‘War-driving’, ‘war-walking’, ‘war-flying’ or ‘war-chalking.’ This involves an unscrupulous person literally driving, walking or even flying around in an attempt to find an unsecured wireless network. Once one is found a nearby wall is commonly ‘chalked’, indicating to any other passer-byrepparttar 135827 presence of a ripe target. The name itself is taken fromrepparttar 135828 act of ‘war-dialling’, a term coined byrepparttar 135829 film ‘WarGames’, where random telephone numbers were dialled inrepparttar 135830 hope of finding a computer onrepparttar 135831 other end ofrepparttar 135832 line.

If a network is found, thenrepparttar 135833 potentialconsequences can range fromrepparttar 135834 fairly innocuous torepparttar 135835 criminal. Atrepparttar 135836 very lowest level a third-party can connect torepparttar 135837 network and accessrepparttar 135838 Internet connection fromrepparttar 135839 router. Ifrepparttar 135840 legitimate owner ofrepparttar 135841 network is on a capped service this can consume a considerable chunk of their bandwidth, leading to extra charges being levied for resources which they never realised were being used. Of far more consequence are some ofrepparttar 135842 uses to which this stolen bandwidth could be put. In a worst case example a paedophile cruising aroundrepparttar 135843 area could spotrepparttar 135844 chalk marking and connect torepparttar 135845 compromised network. Withoutrepparttar 135846 knowledge ofrepparttar 135847 network owners they could connect to any manner of illegal sites, with no record of their passing traceable to them. Becauserepparttar 135848 trail would stop cold atrepparttar 135849 door ofrepparttar 135850 person who has provided them withrepparttar 135851 free access.

Computer Security - What Exactly Is It?

Written by Ciontescu Molie


Althoughrepparttar term 'computer security' is used a lot,repparttar 135735 content of a computer is actually vulnerable to only a few risks unlessrepparttar 135736 computer is connected to others on a network. Asrepparttar 135737 use of computer networks (especiallyrepparttar 135738 Internet) has increased dramatically duringrepparttar 135739 past few years,repparttar 135740 term computer security is now used to describe issues referring torepparttar 135741 networked use of computers and their resources.

The major technical areas of computer security are confidentiality, integrity and authentication/availability.

- Confidentiality, also known as secrecy or privacy, means thatrepparttar 135742 information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range fromrepparttar 135743 embarrassing torepparttar 135744 disastrous.

- Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking.

- Authentication means that an user is who he claims to be.

- Availability means thatrepparttar 135745 resources are accessible by authorized parties. Examples of availability attacks arerepparttar 135746 'denial of service' attacks.

Other important things thatrepparttar 135747 computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only torepparttar 135748 fact that users can only accessrepparttar 135749 resources and services they are entitled to, but also torepparttar 135750 fact that they can't be denied to accessrepparttar 135751 resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use