Wireless Security

Wireless networks pose heightened security risks compared to wired networks due to several key factors.

Figure 6.1 Wireless networking components.

Figure 6.1 Wireless networking components.

The wireless environment consists of three components that provide point of attack, as shown above.

  1. Endpoints: Mobile devices including cell phones, Wi-Fi-enabled laptops or tablets, wireless sensors, and Bluetooth devices.
  2. Access Points: These provide connections to the network or service, such as cell towers, Wi-Fi hotspots, and wireless access points to wired local or wide area networks.
  3. Wireless Medium: This carries radio waves for data transfer, representing another potential vulnerability.

Wireless Network Threats

Due to their broadcast nature and lack of inherent security measures, wireless networks are susceptible to various security threats, including:

Wireless Security Measures

Following this discussion, we can group wireless security measures into those dealing with wireless transmissions, wireless access points, and wireless networks (consisting of wireless routers and endpoints).

  1. Securing Wireless Transmissions: The primary threats to wireless transmissions include eavesdropping, message alteration, and disruption. Effective countermeasures include:
  2. Securing Wireless Access Points: The primary threat concerning wireless access points is unauthorized network access. To mitigate this risk, organizations can implement:

Mobile Device Security