Datamation content and product recommendations are
editorially independent. We may make money when you click on links
to our partners.
Learn More
You can read and read about Wi-Fi security, but nothing will get the point across as efficiently as actually seeing what eavesdroppers can see on an “unsecured wireless network.” You may think your network is secured after just changing the default SSID or disabling SSID broadcasting, especially after reading New York’s Westchester County’s recent press release discussing a new Wi-Fi law for the city of White Plains. As mentioned in the press release, these two actions do take little effort, but by no means does this adequately secure your wireless network.
Understanding the importance of securing a wireless network requires you to be aware of the issues resulting from not securing your network:
Real-time Traffic is Compromised
- People can see what Web sites you’re visiting.
- Login information to unsecured sites (non-SSL) is compromised, along with the content.
- Login information and content from services such as POP3 e-mail accounts and FTP connections is compromised.
Network is Open for Others to Connect
- Your internet connection may be used for sending and/or receiving illegal information, such as spam, music files or even child porn.
- Others can access any shared files on PCs or servers connected to the network.
A Wi-Fi Eavesdropper’s Look
First, let’s take a look at what a Wi-Fi eavesdropper can see when you send an e-mail over a wireless network without encryption. To do this, I sent an e-mail (shown in Figure 1) from a computer on a wireless network with Microsoft Outlook using a POP3 account.
![Security Email]()
FIGURE 1
At the same time, I captured packets from the network on my laptop using a free tool called Ethereal. As shown in Figure 2, you’re able to see exactly what was in the e-mail. Just imagine if this was an e-mail containing real sensitive information, and someone passing by in their car captured the wireless packets.
![Ethereal]()
FIGURE 2 (click to enlarge)
If that isn’t bad enough, see what I captured in the packet trace shown in Figure 3 when I synchronized my e-mail. This sensitive information includes the login information for the POP3 account! It clearly shows the main server, user name and password for the account.
FIGURE 3 (click to enlarge)
To clarify, the administrator of this wireless network could have changed the default SSID, disabled SSID broadcasting, enabled MAC address filtering, and many others things; however, we would still see the same information in Figures 2 and 3.
You should also note that I did capture these packets in Ethereal via an Ethernet connection to the test network. It is possible, though, to use Ethereal to capture packets using a wireless adapter. This brings up another issue: make sure the wired connections to your network are secure, because interlopers can capture any of the Ethernet traffic.
Securing your Private Wireless Network
Now that you understand the importance of Wi-Fi security, you should implement methods like those discussed below to ensure your sensitive information is secure.
To Secure Real-time Traffic
- Use WEP encryption at the minimum; ideally, go with WPA encryption.
To Prevent Others from Connecting
- Try to keep wireless coverage within a controlled area.
- Use MAC address filtering.
- Limit DHCP addresses, or assign static addresses.
- Disable SSID Broadcast.
Keep in mind that the use of encryption is the only method that adequately secures the real-time traffic, such as e-mails and Web browsing, on your wireless network. Most other security methods, such as MAC address filtering and disabling SSID broadcast, are intended to help prevent others from successfully connecting to the wireless network.
You can never be sure that your wireless network is completely secure. However, implementing multiple security methods means it will be much more difficult for Wi-Fi eavesdroppers to capture readable real-time data.
Protecting Yourself on Public Hotspots
When you’re using an unsecured wireless network, such as a hotspot in a hotel, cafe, airport or any other public location, you should take steps to make sure your sensitive information isn’t exposed:
Secure Your Real-time Traffic
- Use a VPN connection.
- Make sure any services you use, such as POP3 and FTP, are secured if you are not using a VPN.
- Don’t visit any private or sensitive Web site unless it’s secured (for example, implementing SSL) if you are not using a VPN.
Prevent Others from Connecting to Your Laptop
- Disable any sharing of files, folders and services.
- Use personal firewall software.
- Make sure your operating system is kept up to date.
A VPN connection encrypts any data sent from your wireless adapter all the way to the VPN server and vice versa, therefore providing end-to-end encryption. Along with providing a great way to secure the data, this also enables access to the remote network hosting via VPN server, which is often used in businesses. If you aren’t provided with a VPN connection by your employer, you can either set up your own server, for example using Windows XP, or use a subscription-based, hosted service such as JiWire’s SpotLock.
Eric Geier is a computing and wireless networking author and consultant. He’s employed with Wireless-Nets, Ltd., a consulting firm focusing on the implementation of wireless mobile solutions and training. Eric is also an author and contributor of several books and eLearning (CBT) courses.
This article was first published on WiFiPlanet.com.
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
-
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
-
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
SEE ALL
ARTICLES