Most people enjoy the benefits brought by wireless technology. Wireless networks clearly offer many advantages to users, but they can also be vulnerable to attacks if proper security measures are not in place.
Unfortunately, the structure of wireless networks has weaknesses that exist outside of the device, and even when you activate the default security features, it is still not secure. However, with some knowledge about wireless technology and a few simple tips, you can help protect yourself from potential threats.
Step 1: Understand Your Network
Consider how wireless networks operate. In “wired” technology, data is transmitted from your computer to the web via cables connected to physical ports, while wireless technology uses radio waves to transmit data. Your data signals are broadcast over a wide range, and anyone within that coverage area can potentially intercept these signals.
Step 2: Change Your SSID and Password
This is a significant step. Every wireless network, from large corporate systems to simple home setups, has a Service Set Identifier (SSID), which is the name of your network. To prevent your signal from being easily identified, you should take two actions: First, change the SSID and password from the default settings to something private and strong. Default SSIDs can make it easy for familiar hackers to set up and breach your network. To change the SSID and password, you need to run the software for your wireless hardware. You should change the SSID within the program’s preferences.
Simply overriding the default SSID won’t be effective if your network name is made known to others. To keep your information private, you should disable SSID broadcast. This is as simple as clicking a button in the program’s preferences.
Step 3: Set Up MAC Filtering
Changing the SSID without implementing MAC filtering is like changing your house lock but leaving the key inside. Media Access Control (MAC) filtering allows you to control who can access your network and who cannot. It takes some time to set up MAC filtering, but without it, hackers can easily penetrate and use your network.
To allow specific computers to use your network, you should add their MAC addresses. Each network device (PC, laptop, router) has a unique 12-digit MAC address. The process for MAC filtering varies by manufacturer, but in most cases, opening the software and locating the security settings will guide you to the right place. Finding the MAC address for each device can also be a challenge if you don’t know where to look. Click here for guidance on finding it within your system.
Step 4: Encryption
There are two types of encryption protocols: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Both aim to prevent unauthorized access by scrambling data. WPA is often favored due to its dynamic nature and continuously changing keys. However, this unexpected encryption key also varies by device and WPA is not as widely adopted as WEP yet. On the other hand, if you cannot access the WPA key, a combination of WEP and MAC filtering is sufficient to deter most amateur hackers. WPA is built into most new routers along with WEP; unless your network components support WPA, WEP will remain the default encryption method.
Step 5: Patch Vulnerabilities with Software
Despite all security measures, hackers can still find ways to break in, often requiring high levels of patience and the right tools. Programs that can assist you include Trend Micro PC-cillin, ZoneAlarm Internet Security Suite, and McAfee Wireless Home Network Security. These programs can scan your network and alert you to any intrusions. A product from AOL called Active Security Monitor can assess your wireless security and remind you to update it.
Pham Van Linh (According to CNet)
Email: [email protected]