Wireless Security
Wireless networks pose heightened security risks compared to wired networks due to several key factors.

Figure 6.1 Wireless networking components.
The wireless environment consists of three components that provide point of attack, as shown above.
- Endpoints: Mobile devices including cell phones, Wi-Fi-enabled laptops or tablets, wireless sensors, and Bluetooth devices.
- Access Points: These provide connections to the network or service, such as cell towers, Wi-Fi hotspots, and wireless access points to wired local or wide area networks.
- Wireless Medium: This carries radio waves for data transfer, representing another potential vulnerability.
Wireless Network Threats
Due to their broadcast nature and lack of inherent security measures, wireless networks are susceptible to various security threats, including:
- Malicious Association: Attackers configure a wireless device to masquerade as a legitimate access point, allowing them to steal passwords and infiltrate wired networks.
- Identity Theft (MAC Spoofing): Attackers eavesdrop on network traffic to identify MAC addresses of computers with network privileges, enabling unauthorized access.
- Man-in-the-Middle Attacks: Attackers intercept communication between a user and an access point, tricking them into believing they are communicating directly.
- Denial of Service (DoS): Attackers flood wireless access points or ports with protocol messages to overwhelm system resources and disrupt network functionality.
Wireless Security Measures
Following this discussion, we can group wireless security measures into those dealing with wireless transmissions, wireless access points, and wireless networks (consisting of wireless routers and endpoints).
- Securing Wireless Transmissions: The primary threats to wireless transmissions include eavesdropping, message alteration, and disruption. Effective countermeasures include:
-
Signal-Hiding Techniques: Measures such as disabling SSID broadcasting, using cryptic SSID names, reducing signal strength, and employing directional antennas and signal-shielding techniques can make it harder for attackers to locate access points.

-
Encryption: Encrypting wireless transmissions helps prevent eavesdropping, provided encryption keys are adequately secured.
- Securing Wireless Access Points: The primary threat concerning wireless access points is unauthorized network access. To mitigate this risk, organizations can implement:
- IEEE 802.1X Standard: This standard offers port-based network access control, providing an authentication mechanism for devices connecting to LANs or wireless networks.
Mobile Device Security