Wan Information

Submitted by: Submitted by

Views: 255

Words: 299

Pages: 2

Category: Science and Technology

Date Submitted: 11/17/2011 12:45 PM

Report This Essay

Running head: Checkpoint

WLAN

Jimmy Howard

University of Phoenix

IT/242

Sheila Wallace

July 7, 2011

WLAN

Wireless technology is rapidly growing in popularity because it is becoming accessible everywhere. WIFI hotspots are available at many places where people congregate or meet, such as popular coffee shops, hotels, resorts, casinos, and hospitals. WLAN technology may be the future of networking; however securing networks using this technology can pose a problem. WLAN use radio signals through the air instead of cables. The wireless process is more convenient than installing yards of cabling for a wired network; however the data traveling in signal form can be intercepted by a knowledgeable hacker.

Securing a WLAN is achieved by restricting access to the network. The service set identifier is assigned to the protected WLAN and must be inputted correctly for anyone to gain network access. The SSID should not be a stand-alone security measure because once someone learns the SSID it can be passed along to unwanted users.

Wireless equivalent privacy is a security protocol that was created to provide another level of security for wireless networks. The WEP can be described as a multi character encrypted password that is only disclosed to trusted network users. WEP may soon be replaced completely by Wi-Fi protected access. WPA solves the problem by abandoning WEP in favor of 802.11i’s vastly improved Temporal Key Integrity Protocol (TKIP). WPA ensures that TKIP keys vary for each packet through key mixing.

WLANs that don’t utilize any security measure can be easily breached by anyone with just limit knowledge of networking. Networks that are exposed to unwanted hackers, place the network resources and information in danger. Personal, financial and business information can be stolen and dispersed across the internet after a security breach.