13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In This Chapter<br />

Chapter 9<br />

Securing Your <strong>Wireless</strong><br />

<strong>Home</strong> Network<br />

� Worrying about wireless home network security<br />

� Understanding WEP<br />

� Saying hooray for WPA<br />

� Getting security on your network<br />

� Securing your network the easy way with Wi-Fi Protected Setup<br />

� Going for bulletpro<strong>of</strong> security<br />

If you read the news — well, at least if you read the same networking news<br />

sources that we do — you’ve probably seen and heard a thing or two (or a<br />

hundred) about wireless local area network (LAN) security. In fact, you really<br />

don’t need to read specialized industry news to hear about this topic. Many<br />

major newspapers and media outlets — The New York Times, the San Jose<br />

Mercury News, and USA Today, among others — have run feature articles documenting<br />

the insecurity <strong>of</strong> wireless LANs. Most <strong>of</strong> these stories have focused<br />

on wardrivers, folks who park in the lots in front <strong>of</strong> <strong>of</strong>fice buildings, pull out<br />

their laptops, and easily get onto corporate networks.<br />

In this chapter, we talk a bit about these security threats and how they may<br />

affect you and your wireless home network. We also (helpful types that we<br />

are) give you some advice on how you can make your wireless home network<br />

more secure. We talk about a system called Wi-Fi Protected Access (WPA),<br />

which can make your network secure to most attacks, and also an older system<br />

called Wired Equivalent Privacy (WEP), which doesn’t do such a good job but<br />

may be the best you can do in many cases.<br />

The advice we give in this chapter applies to any 802.11 wireless network,<br />

whether it uses a, b, g, or n, because the steps you take to batten down the<br />

hatches on your network are virtually identical, regardless <strong>of</strong> which version<br />

<strong>of</strong> 802.11 you choose. (If you missed our discussion on 802.11 basics, jump<br />

over to Chapter 2.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!