13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Basically, what we’re saying here is that the radio waves sent by your wireless<br />

LAN gear will leave your house, and there’s not a darned thing you can<br />

do about it. Nothing. What you can do, however, is make it difficult for other<br />

people to tune into those radio signals, thus (and more importantly) making<br />

it difficult for those who can tune into them to decode them and use them to<br />

get onto your network (without your authorization) or to scrutinize your<br />

e-mail, Web surfing habits, and so on.<br />

You can take several steps to make your wireless network more secure and to<br />

provide some airlink security on your network. We talk about these topics in<br />

the following sections, where we discuss both easy and more complex methods<br />

<strong>of</strong> securing your network.<br />

Getting into Encryption<br />

and Authentication<br />

Chapter 9: Securing Your <strong>Wireless</strong> <strong>Home</strong> Network<br />

Two primary (and related) security functions enable you to secure your network:<br />

encryption and authentication.<br />

� Encryption: Uses a cryptographic cipher to scramble your data before<br />

transmitting it across the network. Only users with the appropriate key<br />

can unscramble (or decipher) this data.<br />

� Authentication: Simply the act <strong>of</strong> verifying that a person connecting to<br />

your wireless LAN is indeed someone you want to have on your network.<br />

With authentication in place, only authorized users can connect with your<br />

APs and gain access to your network and to your Internet connection.<br />

The vast majority <strong>of</strong> wireless LAN gear (access<br />

points and network cards, for example) is<br />

shipped to customers with all the security features<br />

turned <strong>of</strong>f. That’s right: zip, nada, zilch, no<br />

security. A wide-open access point sits there<br />

waiting for anybody who passes by (with a Wi-<br />

Fi equipped computer, at least) to associate with<br />

the access point and get on your network.<br />

This isn’t a bad thing in and <strong>of</strong> itself; initially configuring<br />

your network with security features<br />

turned <strong>of</strong>f and then enabling the security features<br />

after things are up and running is easier<br />

No security!<br />

than doing it the other way ’round. Unfortunately,<br />

many people never take that extra step and activate<br />

their security settings. So a huge number <strong>of</strong><br />

access points out there are completely open to<br />

the public (when they’re within range, at least).<br />

We should add that some people purposely<br />

leave their access point security turned <strong>of</strong>f to<br />

provide free access to their neighborhoods. (We<br />

talk about this topic in Chapter 16.) But we find<br />

that many people don’t intend to do so.<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!