
Securing Your Wireless from Security issue
Use of wireless can not be avoided. gadged had buried all the features wifi (wireless fidelity) for data transfer media. Security will always be inversely proportional to convenience. Because wireless technology is still experiencing growth. Then a lot of crime that occurs with the use of wireless technology. community awareness of this wireless network security issues need to be socialized. The following is a security issue that a lot happening around us:
security techniques
let us secure the flow of data in wireless networks from activities that could hurt us materially and privacy.
Baca selengkapnya
Bagikan
- AMPS mobile phone cloning to steal pulses (a lot happening at the development of technology AMPS)
- cloning mobile sim card to fool the vendor.
- Airsnot can be tapped into the WLAN packets. Other tools like netstumbler, WEPcrack and many circulating freely.
- NITS in the United States prohibits the use of WLAN for a system that has the flow of confidential data.
- Bluetooth bluestumbler jacking and stealing and hacking through bluetooth data without being noticed by users.
- Physical theft of wireless devices.
- Man in middle attack, tapping, passive attack is carried out to steal information such as phone number list, calendar, and other data via bluetooth with no security.
- Resource for wireless hardware like CPU, memory and speed are lack of encryption makes it difficult to meet standards of data security through encryption methods.
- DOS, active attack, injection of new (fake) traffice sending junk messages or information bluejacking and hijacking.
- The main focus of the wireless data transfer as quickly as possible.
security techniques
- network segmentation, enter your wireless network into the extranet system.
- Restricted access based on MAC address
- Encryption: WEP (Wireless Equivalency Protocol), but there are still problems with the initial vector (IV)
- The use of end-to-end encryption at the application level.
let us secure the flow of data in wireless networks from activities that could hurt us materially and privacy.