,

Your IP Address

what is my ip address?

Wireless Security

Wireless Security: Encryption
Encryption is widely used for security of data, including wireless network security. Encryption is where data is translated into code for transmission by the radio waves. An encryption key, similar to a password, is needed to encrypt the code for transfer. If you are only minimally concerned with security, like in wireless home network security, you may consider WEP encryption, which some get easier to configure with their current equipment.

Wireless Security: Protecting your password
Your passwords are crucial to your wireless network security and should not be revealed to unauthorized individuals. Do not leave your password lying around or written in an obvious location. When entering your username and/or password, make sure people aren’t milling around and searching over your shoulder. Be very careful of responding to emails asking for passwords. Most legitimate companies don't ask for passwords by email due to the lack of security. These tips are useful for both wireless security and wired security.

Wireless Security: File Sharing
Wireless network security is important. Always make sure to require a password from users connecting to your computer. Be careful about what folders you permit others to have access to. You can also set passwords on specific folders to further increase security.

Deciding on a Firewall
The firewall you choose should be based primarily on the level of needed security, budget, reliability and the potential must expand the wireless network. The most simple firewall, with minimal security is one thats part of a simple wireless router. The next level up is a dedicated firewall. After that comes a dedicated firewall device with a gateway. Finally, the highest level of wireless security is a dedicated firewall device (such as a computer) with a combination of proxy firewall and full packet filtering.

Wireless Security Encryption:
WEP, wired equivalent privacy, is the standard encryption security thats built into all Wi-Fi devices. WEP does not provide as good of wireless security as WPA does, but is adequate for minimal security purposes.

Wireless Security: MAC filtering
All devices on a wireless network have a MAC (media access control) address. This is a different identification number thats part of the individual hardware. MAC filtering is where the access points on a wireless network will only speak with devices which you specify. MAC filtering is an excellent tool to use to enhance wireless security. This works really good for wireless home network security, because the number of wireless devices will be manageable to work with.

Wireless Security: Firewall
A firewall is either a part of hardware or software which is used to block outsiders from accessing a network. Firewalls are an essential part of wireless network security. It works through controlling traffic between given zones of trust. A user has the ability to decide what is trustworthy and what is not. If you are running a wireless network, you may want to consider using a firewall which is built into a wireless router.

Wireless Security: Securing your laptop
One of the benefits of a wireless network is the portability of computers. However, this can also lead to a serious wireless security risk – theft of computer. If you are traveling and using your computer in a hot spot area, don't leave it lying around outside of your eyesight. Consider investing in a cable lock, which will secure your laptop (or desktop) to a stationary object. There are higher levels of security you can look into, like cards that sound an alarm with unauthorized movement.

Using more then one firewall
You should only run one firewall on your network. This is real for both office and wireless home network security. If you run additional firewalls, you run the risk of conflicts. However, for wireless security, you can run one hardware firewall and one software firewall. For example, you can use a wireless router for the hardware firewall and firewall software on the computer.

Wireless Security: Setting Password
Remember that your wireless home network is broadcast by radio waves, as well as can be accessible to anybody with range. If you don't set a password on your ad hoc network, then anybody within range can access the network. For this reason, it is crucial to set a password to protect your systems and to increase your wireless network security.

Basic Wireless Network Security
There are several simple steps that everyone should do to help ensure wireless network security. When configuring your network, change the default names on the computers and set the SSID not to broadcast. Use wired equivalent privacy (WEP) encryption at a minimum. Change all default passwords for software and hardware. Finally, make sure to run antivirus software and antispyware software on all your computers.

Choosing a good password for wireless security
There are several tips to remember when choosing a good password for wireless security. Do not use your name, initials or easy to guess numbers, like address, birthday, etc. Any password based on personal information is a poor choice. Passwords should be at least eight characters long, as well as includes both numbers and characters. And remember, no matter how clever your password is, if you write it down where it is easily found, it won’t be very secure.

Wireless Security: VPN
VPN stands for virtual private network, as well as is another wireless security measure used. VPN’s encrypt information as it is sent by the wireless network. VPN software must be installed on individual computers, as well as in order to link to the network, a username and password is required. When used properly, VPN’s drastically increase wireless security and is a really good security tool if you are connecting to a wireless home network from a public hot spot.

Wireless Security Encryption: WPA
WPA, Wi-Fi protected access, is an upgraded version of WEP. This newer protocol is more secure then WEP and, if you use a good password, is much tougher to crack. WPA devices are backwards compatible with WEP; however, in order to use WPA for wireless network security, all devices must have WPA.

0 comments:

Post a Comment