Networking / Beginners

Point-to-Point Wireless Application Security

When you think of security, it is important to conceptualize how to maintain a secure connection from the point of the user to the point of the server. The first action in creating a secure wireless infrastructure is to focus on secure remote access.

Secure remote access means creating secure communication so that you can exchange various identifying items securely, including passwords, cryptographic keys, session keys, and challenge-response dialogs.

Wireless environments are vulnerable to the same types of denial of service (DoS) and flooding attacks as wired networks. Hackers try to obtain access to your internal wireless infrastructure to initiate these attacks that essentially make your wireless infrastructure collapse so that you are not able to serve your users effectively.

Point of Interception

If someone does try to compromise the infrastructure of your wireless network, you can be sure that the point of interception will take place at the location where signals are transmitted from your internal network. Any form of interception or eavesdropping is not only easy to do nowadays, but can be done with prefabricated scanners designed to pick up the transmissions of your network. Most people believe that if their wireless network is digital instead of analog, in some way they have a greater level of protection. Unfortunately, nothing is further from the truth. Scanners are designed now to pick up signals from either an analog or a digital environment. These scanners are sometimes not even very complicated and are very inexpensive. This makes the realm of hacking accessible to almost anyone interested in attempting an attack on your wireless infrastructure.

[Contents] [Next]