JosefinaRobey916

From CCCWiki
Revision as of 20:46, 9 April 2013 by 173.237.182.86 (talk) (Created page with "One of many fastest growing sectors of Internet connection today is Wireless Internet. Wi-Fi, or Wireless Fidelity, is Internet connection over dual group systems which can be la...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

One of many fastest growing sectors of Internet connection today is Wireless Internet. Wi-Fi, or Wireless Fidelity, is Internet connection over dual group systems which can be labeled with a set of criteria mostly known as 802.11, 802.11a, and 802.11b. While there are several other standards, these three are the most common at the moment. Access during these kinds of communities is available in most major cities in the Usa, and the technological standards used to define Wi-Fi access are in use in a great many other places.

The 802.11 standards may be classified by several special characteristics, as well as the possible rate available. 802.11a and 802.11b are now considered both fastest wireless network standards giving submissions as much as packages and 11mbps at a quick 54mbps. Obviously these rates can take on any satellite or DSL Internet presenting, and many cable services are somewhat slower.

Protection Issues:

The ease and convenience of use of Wi-Fi connectivity also includes several safety issues. Combined with standard safety issues inherent in a wired connection, data sent and received via a wireless connection can be intercepted and received very nearly anywhere within a given range. With the introduction of Wired Equivalent Privacy, or WEP, encryption has changed into a regular safety measure with nearly every wireless high speed internet connection. Despite a WEP input place the data may be taken, it is just unlikely that the info would be helpful. Obviously the data could be eventually accessed by a determined hacker, but this will be the exception not the rule.

A more common Wi-Fi security issue is known as an Evil Twin Attack. This type of attack occurs whenever a hacker hijacks a wireless network signal. The hijacker creates a access point in their own mobile computer, basically supplying a wireless network to anyone within array of their transmission. The hacker then enters a favorite wireless access region like a coffee shop or mall and makes their network available. Each time a person tries to log into the network offered by their favorite coffee shop, it's possible they incorrectly select the hacker's wireless access point. It is a way a hacker can bypass many security measures often including encryption. Every package of information sent or received via an Evil Twin can be acquired to the hijacker. There are numerous safety measures that can be taken up to prevent an Evil Twin attack as well as other dangers. These include:

Use WPA or WPA2 safety. That prevents any unencrypted data from being delivered, and configures all protection tips at the router. This is only available with a property service.

When setting up home instant entry, rename the community from the factory preset to some thing special. This can ensure that the proper circle is obviously used.

Never wood into a wireless network that will not use Secured Socket Layer (SSL) security.

Work with a smart application customer that encrypts all data before it is ever provided for the Net.

Try to just make use of a wireless link that delivers Wi-Fi Protected Access (WPA). The security is further strengthened by wpa provided by WEP. PureVolume™