Wireless and Security
Wireless computing gives us freedom of getting online without any restriction in time and space. Now you can take your laptop and get connection to the Internet wherever is offered wireless service. It can be a library, café or even beach. You can also purchase a wireless base station, called a router, for your home so you can get online anywhere in the house or in the immediate vicinity outdoors. But from information security awareness side, you need to do some thing to employ these options safe.
What is Wireless network and how it's work?
Wireless (Wi-Fi) or 802.11 networks is a method of connecting a computer to other computers or to the Internet without linking them by cables.
This network uses radio waves, just like cell phones and radios do. This communication, across wireless network, is similar two-way radio communication.
1. Routers collect the signal and decode, and then send information to the Internet using a physical, wired Ethernet connection.
2. Wireless adapter on your laptop translate data into radio signal and transmit it using antenna.
3. And vice versa... (http://www.howstuffworks.com)
Why this kind connection is so unsafe?
Because these transmissions occur in one frequency and mostly they don't have protection against unauthorized access. So, that's means that anyone in range can pick up the signal or transmit on the same time.
From what wireless network are at risk?
From anyone in the range who can connect to your network - hackers.
From unauthorized users who use your broadband internet connection without your permission.
What can protect your wireless connection?
Anti-virus and anti-spyware software and a firewall - these things should be on every computer independent wireless network using or not.
Caution - turn off your wireless network when you know you won't use it and also turn off identifier broadcasting on your wireless router. So your computer won't send a signal to any device in the vicinity announcing its presence.
Limitation - allow only specific computers to access your wireless network and modify your router's pre-set password for administration to something only you know.
Article source: infosecuritylab
Related Tags: security, wireless security, information security awareness, infosecuritylab, information security awareness training, informations security awareness training, informations security awareness
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Improper Way Of Marketing Reflects Poorly On A Company.
New business, product or service everything requires visibility, awareness in order to come into the - Replacing Paper Prints With Online Versions
Nowadays saving out on resources and being additionally informative are both aspects that are in. In - Stop Smoking Effectively
If I told you of a way that you could stop smoking harmful tobacco would you believe it? Most people - What Is Runtime Error 182? And How To Fix It
Are you finding an effective way to fix runtime error 182? Do you think fixing runtime error 182 is - Do You Know How To Fix Runtime Error 87 In Minutes?
Are you finding an effective way to fix runtime error 87? Do you think fixing runtime error 87 is to - Knowledge About Avi, Avi Player, Avi Converter On Mac
Knowledge about AVI, AVI player, AVI Converter on MacWhat is an AVI?AVI, an acronym for Audio Video - Buy Your Highly Successful Email Survey Software Today
Email Survey Software- Boost Your Business and Increase ProfitsAn email survey software could be one - Xrm - The Anything Relationship Management Solution
I recently attended the Microsoft Dynamics West Region FY11 Sales Planning Retreat. This year's meet - What Are The Benefits Of Working With Electronic Medical Records
Recording medical information is a vital part of health care services. These records are necessary f - Basic Factor To Make Website Business Oriented
Internet is home for millions of websites. The online business is becoming more and more competitive
Most viewed articles in this category:
- Parental Control Software
Parental control software is software that can help parents protect their children when they are onl - Digital Asset Management Software
Managing and organizing your organization's documents is a critical component to your business's suc - AdobeRGB vs. sRGB
Understanding color spaces I'll try to explain it very simplified, but understandable for everyone - Confessions of a Prankster
I wanted to get a jump on April Fool's Day, partially because of the long, cold winter blues, and pa - Malicious Thoughts About The Spyware Ills Of My PC
Who would think I was capable of such revengeful thoughts about the parties responsible for inflicti - Recover File and Recover Deleted File Tools
Data recovery software is a very effective way of retrieving data from a worn or damaged hard disk d - Life without Windows
Ubuntu, a user-friendly version of Linux, has been running so nicely on my home PC that I decided to - What Benefit Does an Online Software Download Site Offer You?
Are you having a problem that where you find a good softeware when you consider to have a try or wan - Maintaining A Website
There was an era when people were talking about how to create a website using html coding or some ea - Benefits Of Proper Time Tracking
Have you ever written down time when you have started and finished your work? Maybe you have had mul