WLAN Security Threats caused by unauthorized actions

Asked By 120 points N/A Posted on -
qa-featured

Nowadays, wireless LAN is widely used, as it is very convenient for building a network easily, without managing physical cables.

So please, I want information as to what unauthorized actions might be committed easily, in a wireless LAN environment.

Thanks.

SHARE
Best Answer by ballileo
Best Answer
Best Answer
Answered By 0 points N/A #86030

WLAN Security Threats caused by unauthorized actions

qa-featured

Dear Johnny,

The following unauthorized actions may be committed easily in a wireless LAN environment where proper security measures have not been taken:

1. Unauthorized use of network

  • Posing as another person by using the other person's IP address.
  • Various attacks via the internet.
  • Creating a stepping stone for unauthorized access (sending spam mail).
  • Consuming bandwidth, causing slow access speed.

2. Tapping Communication

  • Leakage of a user ID and password.
  • Leakage of confidential and personal information.

3. Unauthorized access to information resources

  • Information theft, alteration and deletion caused by file sharing.
  • Mounting an improper program such as a virus.
Answered By 5 points N/A #86032

WLAN Security Threats caused by unauthorized actions

qa-featured

Wireless local area network (WLAN) is nowadays the main connectivity option in many sectors due to many reasons, such as ease of installation, flexibility, mobility, reduced cost-of-ownership, and scalability. However, regardless of the benefits mentioned above, WLAN have some security threats which are discussed below. Basic components of a WLAN are access points (APs) and Network Interface Cards (NICs)/client adapters.

Wireless client adapters connect a PC or workstation to a wireless network either in ad hoc peer-to-peer mode or in infrastructure mode with APs (will be discussed in the following section). Available in a PCMCIA (Personal Computer Memory Card International Association) card and PCI (Peripheral Component Interconnect), it connects desktop and mobile computing devices wirelessly to all network resources.

The NIC scans the available frequency spectrum of connectivity and associates it to an access point or another wireless client. It is coupled to the PC/workstation operating system using a software driver. The NIC enables new PCs to be connected instantly to the network and enable Internet access.

The WLAN components mentioned above are connected in certain configurations. There are three main types of WLAN architecture: Independent, Infrastructure, and microcells and roaming.


 There are three main types of WLAN

(Independent)

(Infrastructure)

WLAN without proper security

(Microcells and Roaming)

We will NOT go in details of these BUT have pointed out the options available. The Unauthorized actions which can be performed on the WLAN without proper security are:

Denial of Service-

In this kind of attack, the intruder floods the network with either valid or invalid messages affecting the availability of the network resources.

Spoofing and Session Hijacking.

This is where the attacker could gain access to privileged data and resources in the network by assuming the identity of a valid user.

Eavesdropping.

This involves attack against the confidentiality of the data that is being transmitted across the network.

In order to secure your WLAN there are multiple tools which can be used. Try to go through this site. Which will explain major security options to secure the WLAN. 

Related Questions