Go Back   TechArena Community > Technology > Networking & Security
Become a Member!
Forgot your username/password?
Tags Active Topics RSS Search Mark Forums Read

Reply
 
Thread Tools Search this Thread
  #1  
Old 14-02-2011
Member
 
Join Date: Feb 2011
Posts: 3
Is there risk factor despite encryption in WLAN security?

I am here to clear some of my doubts. Here I can get direct solutions for my questions, I thought to log here and post my query. I want to know about WLAN security. I have been told that even after giving the password, it is not safe if your system is in WLAN. Is that true? Is there risk factor despite encryption in WLAN security? If yes, then please tell me how can I avoid such risks? I think that I have explained properly and hope you people will help me. If I have posted in wrong section please ignore, as this is the first time I am posting here.
Reply With Quote
  #2  
Old 14-02-2011
Member
 
Join Date: Mar 2008
Posts: 151
Re: Is there risk factor despite encryption in WLAN security?

Let me tell you that on the subject of wireless security seems all is said: Encrypting the wireless network with WPA, and attackers have no chance. Or even better: Do not completely rely on wireless and wired Ethernet use. However: The latter in particular is a dangerous fallacy. The years of scolding to the industry and the media has paid off: according to the year of the RSA encryption specialists study the security of wireless LANs are encrypted, for example, in New York 97 percent of corporate wireless networks. In Paris there are at least 94 percent, and also discovered in the banking metropolis of London 80 per cent seem to be quite promising. It has obviously got around that the operation of unencrypted wireless outstandingly good idea is no access points.
Reply With Quote
  #3  
Old 14-02-2011
Member
 
Join Date: Oct 2008
Posts: 119
Re: Is there risk factor despite encryption in WLAN security?

Quote:
It has obviously got around that the operation of unencrypted wireless outstandingly good idea is no access points.
So everything is in order, and the companies have done their homework regarding the securing from their infrastructure? Not at all. For in London and New York are just over 50 percent of companies on the WEP (Wired Equivalent Privacy) encoding. That this is even by lay people within minutes or even seconds to crack, has either not been milled to the attention of IT managers. Or older, WPA (WiFi Protected Access)-enabled wireless devices such as VoIP phones and scanning devices to prevent the shutdown of the insecure encryption. In Paris, after all, share 72 percent of corporate wireless networks to secure WEP's successor, WPA and WPA2. Bleak it looks, however, when it comes to the details of the vulnerability of WEP and WPA. Here, those responsible often hardly the needed information.
Reply With Quote
  #4  
Old 14-02-2011
Member
 
Join Date: Oct 2008
Posts: 107
Re: Is there risk factor despite encryption in WLAN security?

Often overlooked is the disadvantage of WPA/WPA2, in conjunction with pre-shared keys (PSK), is thus fixed passwords. Entered once noted, the devices or their operating systems to the PSC. If a device is lost, a third party can read the key and easily in the network log. Because by PSC can only devices, but do not identify individuals. A solution to this problem is the use of WPA2 in conjunction with 802.1X, since the respective user by a RADIUS server must be recognized. 802.1X also makes an end to the complicated administration of the pre-shared keys that are in doubt, have mostly by hand at all access points and devices are changed. Particularly for companies with smaller IT teams, this work is to facilitate a real blessing. A stumbling block, however, could be the hardware: If most companies already RADIUS server available - Windows Server 2000 Server Post-function, the RADIUS from the factory with - there are also problems with the Ethernet switches. So many older models can do with 802.1X nothing, so any investment in new network infrastructure is due. Incidentally, all the investment in a secure 802.1X via WLAN are waste of money if the wired network is not also covered. For example, if open access Ethernet ports in conference rooms or waiting to be found, an attacker must go not only to go through the cracking of the wireless network: it docks via a network cable directly to the intranet.
Reply With Quote
  #5  
Old 14-02-2011
Member
 
Join Date: Apr 2009
Posts: 107
Re: Is there risk factor despite encryption in WLAN security?

Many IT security managers like a crack of its wireless coding equanimity see, it has such as databases and e-mail server on the intranet is also encrypted. A malicious hacker would have access to the intranet while, met here but perfectly coded data - at least the idea. Unfortunately, this peace is more than illusory. Since it is still skipping the first hurdle - Wireless encryption in the case of local attacks, firewall in the event of an attack on the Internet - for Cracker only obligation. The free program is to get through vulnerable applications to the relevant data. are examples of vulnerable applications: SQL injection bugs in widely used client applications such as Adobe Flash or Adobe Acrobat, not updates fix vulnerabilities in client and server operating systems or novel attacks, for example, automatic software update mechanisms.
Reply With Quote
  #6  
Old 14-02-2011
Member
 
Join Date: Apr 2008
Posts: 240
Re: Is there risk factor despite encryption in WLAN security?

The latter is an active man-in-the-middle attack ahead, but also in wireless networks has become one of the standard repertoire of crackers. If the attacker is the one used in the Middle, appropriate tools to use. This common flutter on victims PCs installed applications like Adobe Acrobat or Skype before, that there are program updates. Will the user as usual, download the update mechanism for applying the update, provide the tools from the supposedly current version. De facto, it is a trojan or other malware to the user on the PC obsolete. Since only a few software updater such as the Windows - native Windows Update to protect features such as encrypted transmission or digitally signed executable file set, notice the applications are not duped, that the update did not come from the software manufacturer.
Reply With Quote
Reply

  TechArena Community > Technology > Networking & Security
Tags: , , , , , , ,



Thread Tools Search this Thread
Search this Thread:

Advanced Search


Similar Threads for: "Is there risk factor despite encryption in WLAN security?"
Thread Thread Starter Forum Replies Last Post
Increased risk of threats to e-mail security Ekavali Networking & Security 6 14-02-2011 05:46 PM
Security risk in Linux Mint (IVORY) Networking & Security 5 18-01-2011 11:19 AM
Network security risk management Mariah-Simpson Networking & Security 5 10-03-2010 04:47 AM
Virtualisation and security risk Triple-X Networking & Security 3 26-10-2009 09:12 AM


All times are GMT +5.5. The time now is 03:05 AM.