Results 1 to 6 of 6

Thread: Is there risk factor despite encryption in WLAN security?

  1. #1
    Join Date
    Feb 2011
    Posts
    3

    Is there risk factor despite encryption in WLAN security?

    I am here to clear some of my doubts. Here I can get direct solutions for my questions, I thought to log here and post my query. I want to know about WLAN security. I have been told that even after giving the password, it is not safe if your system is in WLAN. Is that true? Is there risk factor despite encryption in WLAN security? If yes, then please tell me how can I avoid such risks? I think that I have explained properly and hope you people will help me. If I have posted in wrong section please ignore, as this is the first time I am posting here.

  2. #2
    Join Date
    Mar 2008
    Posts
    151

    Re: Is there risk factor despite encryption in WLAN security?

    Let me tell you that on the subject of wireless security seems all is said: Encrypting the wireless network with WPA, and attackers have no chance. Or even better: Do not completely rely on wireless and wired Ethernet use. However: The latter in particular is a dangerous fallacy. The years of scolding to the industry and the media has paid off: according to the year of the RSA encryption specialists study the security of wireless LANs are encrypted, for example, in New York 97 percent of corporate wireless networks. In Paris there are at least 94 percent, and also discovered in the banking metropolis of London 80 per cent seem to be quite promising. It has obviously got around that the operation of unencrypted wireless outstandingly good idea is no access points.

  3. #3
    Join Date
    Oct 2008
    Posts
    119

    Re: Is there risk factor despite encryption in WLAN security?

    It has obviously got around that the operation of unencrypted wireless outstandingly good idea is no access points.
    So everything is in order, and the companies have done their homework regarding the securing from their infrastructure? Not at all. For in London and New York are just over 50 percent of companies on the WEP (Wired Equivalent Privacy) encoding. That this is even by lay people within minutes or even seconds to crack, has either not been milled to the attention of IT managers. Or older, WPA (WiFi Protected Access)-enabled wireless devices such as VoIP phones and scanning devices to prevent the shutdown of the insecure encryption. In Paris, after all, share 72 percent of corporate wireless networks to secure WEP's successor, WPA and WPA2. Bleak it looks, however, when it comes to the details of the vulnerability of WEP and WPA. Here, those responsible often hardly the needed information.

  4. #4
    Join Date
    Oct 2008
    Posts
    107

    Re: Is there risk factor despite encryption in WLAN security?

    Often overlooked is the disadvantage of WPA/WPA2, in conjunction with pre-shared keys (PSK), is thus fixed passwords. Entered once noted, the devices or their operating systems to the PSC. If a device is lost, a third party can read the key and easily in the network log. Because by PSC can only devices, but do not identify individuals. A solution to this problem is the use of WPA2 in conjunction with 802.1X, since the respective user by a RADIUS server must be recognized. 802.1X also makes an end to the complicated administration of the pre-shared keys that are in doubt, have mostly by hand at all access points and devices are changed. Particularly for companies with smaller IT teams, this work is to facilitate a real blessing. A stumbling block, however, could be the hardware: If most companies already RADIUS server available - Windows Server 2000 Server Post-function, the RADIUS from the factory with - there are also problems with the Ethernet switches. So many older models can do with 802.1X nothing, so any investment in new network infrastructure is due. Incidentally, all the investment in a secure 802.1X via WLAN are waste of money if the wired network is not also covered. For example, if open access Ethernet ports in conference rooms or waiting to be found, an attacker must go not only to go through the cracking of the wireless network: it docks via a network cable directly to the intranet.

  5. #5
    Join Date
    Apr 2009
    Posts
    107

    Re: Is there risk factor despite encryption in WLAN security?

    Many IT security managers like a crack of its wireless coding equanimity see, it has such as databases and e-mail server on the intranet is also encrypted. A malicious hacker would have access to the intranet while, met here but perfectly coded data - at least the idea. Unfortunately, this peace is more than illusory. Since it is still skipping the first hurdle - Wireless encryption in the case of local attacks, firewall in the event of an attack on the Internet - for Cracker only obligation. The free program is to get through vulnerable applications to the relevant data. are examples of vulnerable applications: SQL injection bugs in widely used client applications such as Adobe Flash or Adobe Acrobat, not updates fix vulnerabilities in client and server operating systems or novel attacks, for example, automatic software update mechanisms.

  6. #6
    Join Date
    Apr 2008
    Posts
    240

    Re: Is there risk factor despite encryption in WLAN security?

    The latter is an active man-in-the-middle attack ahead, but also in wireless networks has become one of the standard repertoire of crackers. If the attacker is the one used in the Middle, appropriate tools to use. This common flutter on victims PCs installed applications like Adobe Acrobat or Skype before, that there are program updates. Will the user as usual, download the update mechanism for applying the update, provide the tools from the supposedly current version. De facto, it is a trojan or other malware to the user on the PC obsolete. Since only a few software updater such as the Windows - native Windows Update to protect features such as encrypted transmission or digitally signed executable file set, notice the applications are not duped, that the update did not come from the software manufacturer.

Similar Threads

  1. Increased risk of threats to e-mail security
    By Ekavali in forum Networking & Security
    Replies: 6
    Last Post: 14-02-2011, 05:46 PM
  2. Security risk in Linux Mint
    By (IVORY) in forum Networking & Security
    Replies: 5
    Last Post: 18-01-2011, 11:19 AM
  3. Network security risk management
    By Mariah-Simpson in forum Networking & Security
    Replies: 5
    Last Post: 10-03-2010, 04:47 AM
  4. Virtualisation and security risk
    By Triple-X in forum Networking & Security
    Replies: 3
    Last Post: 26-10-2009, 09:12 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,711,664,635.12976 seconds with 17 queries