13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

106<br />

Part II: Making Plans<br />

Security<br />

Unless you work for the government or handle sensitive data on your computer,<br />

you probably aren’t overly concerned about the privacy <strong>of</strong> the information<br />

stored on your home network. Usually it’s not an issue anyway because<br />

someone would have to break into your house to access your network. But if<br />

you have a wireless network, the radio signals transmitted by your network<br />

don’t automatically stop at the outside walls <strong>of</strong> your house. In fact, a neighbor<br />

or even someone driving by on the street in front <strong>of</strong> your house can use<br />

a computer and a wireless networking adapter to grab information right <strong>of</strong>f<br />

your computer, including deleting your files, inserting viruses, and using your<br />

computer to send spam — unless you take steps to protect your network.<br />

The original security technology for Wi-Fi equipment was Wired Equivalent<br />

Privacy (WEP). Perhaps the most well-publicized aspect <strong>of</strong> Wi-Fi wireless networking<br />

is the fact that the WEP security feature <strong>of</strong> Wi-Fi networks can be<br />

hacked (broken into electronically). Hackers have successfully retrieved<br />

secret WEP keys used to encrypt data on Wi-Fi networks. With these keys,<br />

the hacker can decrypt the packets <strong>of</strong> data transmitted over a wireless network.<br />

Since 2003, the Wi-Fi Alliance has been certifying and promoting a<br />

replacement security technology for WEP: Wi-Fi Protected Access (WPA and<br />

the newer but closely related WPA2). WPA/WPA2 is based on an IEEE standard<br />

effort known as 802.11i (so many 802.11s huh?). This technology, which<br />

makes cracking a network’s encryption key much more difficult, is standard<br />

in most Wi-Fi access points and network adapters available now. As discussed<br />

earlier in this chapter, in the section “Certification and Standards Support,”<br />

look for Wi-Fi Alliance certifications for WPA equipment.<br />

Any Wi-Fi gear that you buy should support the latest security certification —<br />

WPA2. Don’t accept any less and don’t forget to turn on your network’s<br />

security.<br />

See Chapter 9 for a full discussion <strong>of</strong> how to set up basic security for your<br />

wireless home network.<br />

Other useful security features to look for when buying an AP include<br />

� Network Address Translation (NAT), which we discuss earlier in this<br />

chapter<br />

� Virtual Private Network (VPN) pass-through that allows wireless network<br />

users secure access to corporate networks<br />

� Monitoring s<strong>of</strong>tware that logs and alerts you to computers from the<br />

Internet attempting to access your network<br />

� Logging and blocking utilities that enable you to log content transmitted<br />

over the network as well as to block access to given Web sites

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!