Você está na página 1de 17

Wireless Networks Security

Prepared for Dr. Wibowo IFMG 250

Sub itted by !os"ua Muscatello !os"ua Marti#

$pril 20% 2005

I. I#troductio# II. Ma&or Networki#' (ardware )o po#e#ts a. Network I#terface )ards b. Mode s c. *outers d. (ubs e. Switc"es f. $ccess Poi#ts '. Pri#t Ser+er II. Wired Networks a. Defi#itio# b. ,ypes c. *a#'e d. -e#efit III. Wireless Networks a. Defi#itio# b. ,ypes c. ,ra#s issio# Sta#dards d. *a#'e e. -e#efit I.. Wired Networks +s. Wireless Networks a. Mobility b. )ost c. *a#'e d. Speed e. Security .. Wireless Network Security a. W"at is at *isk/ i. )o#fide#tiality ii. I#te'rity iii. $+ailability b. I#trusio# Met"ods i. ,ro&a# (orse ii. De#ial of Ser+ice 0D1S2 iii. 3 ail Spoofi#' i+. 3 ail4-or#e .iruses +. Packet S#iffi#' c. Pre+e#tati+e Met"ods i. Firewalls ii. 3#cryptio# iii. $#ti4+irus $pplicatio#s i+. $#ti Spy ware applicatio#s .I. )o#clusio#

Abstract $s tec"#olo'y ad+a#ces i# society t"e #eed for wired a#d wireless #etworki#' "as beco e esse#tial. 3ac" of t"ese types of #etworki#' "as t"eir ad+a#ta'es a#d disad+a#ta'es accordi#' to security. Wired #etworki#' "as differe#t "ardware re5uire e#ts a#d t"e ra#'e a#d be#efits are differe#t. Wireless #etworki#' takes i#to co#sideratio# t"e ra#'e% obility% a#d t"e se+eral types of "ardware co po#e#ts #eeded

to establis" a wireless #etwork. $s you read o# you will u#dersta#d differe#t types of co#fi'uratio#s of #etworks a#d t"e security secure #etwork. easures t"at #eed to be take# to e#sure a

Introduction 1r'a#i6atio#s rely "ea+ily o# t"e ability to s"are i#for atio# t"rou'"out t"e or'a#i6atio# i# a# efficie#t a#d producti+e a##er. )o puter #etworks "a+e allowed for

t"is tec"#olo'y a#d are #ow apart of al ost e+ery busi#ess. $# or'a#i6atio# "as two optio#s w"e# it co es to setti#' up a #etwork. ,"ey ca# use a co pletely wired #etwork% w"ic" uses #etworki#' cable to co##ect co puters% or t"ey ca# use a wireless #etwork% w"ic" uses radio fre5ue#cies to co##ect co puter. Wireless #etworks "a+e allowed or'a#i6atio#s to beco e ore obile7 t"erefore% or'a#i6atio#s are #ow usi#' a

co bi#atio# of bot" wired a#d wireless #etworks. ,"ey basic "ardware layout for t"e two types of #etworks are fairly si ilar but for a# or'a#i6atio# to 'o wireless it re5uires a few ore "ardware co po#e#ts. $lt"ou'"

#etworks pro+ide co#+e#ie#ce t"ey do ope# t"e or'a#i6atio# up to security a#d pri+acy risks. If a co pa#y is faced wit" a security t"ey are ways t"at t"ey ca# fi8 a#d pre+e#t future security risks. $s you read o#% you will lear# "ow t"e #etwork "as beco e a# esse#tial part of today9s or'a#i6atio#s.

Hardware Components :

-efore o#e ca# be'i# to setup a #etwork t"ey #etwork i#terface card% co

ust first be sure t"ey "a+e a

o#ly referred to as a NI). $ NI) is a de+ice t"at co##ects

a co puter or ot"er de+ice to a #etwork. For co puters% t"e NI) is usually i#stalled i# a# e8pa#sio# slot a#d "as a c"ip t"at "a#dles t"e p"ysical a#d data4li#k layers of #etwork co u#icatio#s. 0)ert.or';,ec"2 ,o establis" your #etwork you will #eed a few key co po#e#ts. If you pla# to access t"e i#ter#et you will start your #etwork off wit" a cable ode ode . ,"is type of

is desi'#ed to operate usi#' your e8isti#' cable li#es. )able i#ter#et "as a "i'" ost% if #ot% all applicatio#s you will be usi#'. ,"e seco#d o#e #etwork to a#ot"er o#ly two #etworks or a

ba#dwidt" a#d ca# support

co po#e#t is a router. $ router is a de+ice t"at routes data fro #etwork. $ router is co##ected to at least two #etworks% co

#etwork a#d its ISP<s #etwork. $ router allows for e+eryo#e o# t"e #etwork to access t"e i#ter#et.0Webopedia.co 2 ,"e #e8t co po#e#t t"at you will #eed to setup a #etwork is a "ub or so eti es a switc". $ "ub is a de+ice t"at co##ects t"e cables fro co puters a#d ot"er de+ices suc"

as pri#ters i# a #etwork. ,raditio#ally% "ubs are used for star topolo'y #etworks% but t"ey are ofte# used wit" ot"er co#fi'uratio#s to ake it easy to add a#d re o+e co puters

wit"out bri#'i#' dow# t"e #etwork. 0Webopedia.co 2 $ "ub ca# be eit"er acti+e or passi+e7 si ply forwardi#' essa'es or a plifyi#' or refres"i#' t"e data. $ switc" is a ultiple co puters% access poi#ts%

de+ice si ilar to a "ub t"at e#ables t"e co##ectio# of

a#d ot"er #etwork e#abled de+ices. ,"e differe#ce betwee# a "ub a#d a switc" is t"at a switc" filters t"e data t"at passes t"rou'" it a#d a "ub does #ot. ,"ese co po#e#ts "a+e all bee# odified a#d are capable of establis"i#' wireless ore efficie#t way of

#etworks. $ router ca# be purc"ased wit" wireless capability but a

addi#' wireless to your #etwork is to si ply add wired access poi#ts. $# access poi#t will bride a wired #etwork wit" a wireless #etwork a#d ca# be "ard wired i# to your

e8isti#' syste . 0Wi4Fipla#et.co 2 ,"is optio# allows for t"e #etwork.

obility of a wireless

$#ot"er key co po#e#t is a pri#t ser+er. $ pri#t ser+er is used to co##ect pri#ters to a #etwork to allow for #etwork pri#ti#'. ,"e ser+er will act as a buffer7 stori#' t"e essa'i#' a#d pri#ti#' t"e i# order of t"e 5ueue. ,"is de+ice ca#

drastically reduce t"e cost of #etworki#' because #ow e+eryo#e ca# use t"e sa e pri#ter wit"out "a+i#' a pri#ter attac"ed to e+ery co puter.

Wired Networks Wired #etworks% also called 3t"er#et #etworks% are t"e local area #etwork 0>$N2 tec"#olo'y. $ wired #etwork is si ply a collectio# of two or ore co puters% pri#ters% a#d ost co o# type of

ot"er de+ices li#ked by 3t"er#et cables. 3t"er#et is t"e fastest wired #etwork protocol% wit" co##ectio# speeds of ?0 e'abits per seco#d 0Mbps2 to ?00 Mbps or "i'"er.

Wired #etworks ca# also be used as part of ot"er wired a#d wireless #etworks. ,o co##ect a co puter to a #etwork wit" a# 3t"er#et cable% t"e co puter ust "a+e a#

3t"er#et adapter 0so eti es called a #etwork i#terface card% or NI)2. 3t"er#et adapters ca# be i#ter#al 0i#stalled i# a co puter2 or e8ter#al 0"oused i# a separate case2. So e co puters i#clude a built4i# 3t"er#et adapter port% w"ic" eli i#ates t"e #eed for a separate adapter 0Microsoft2. ,"ere are t"ree basic #etwork topolo'ies t"at are co o#ly used today. 0(o e#t"elp.co 2 ,"e star #etwork% a 'e#eral t"at co##ects to t"ree or ore si plistic type of topolo'y% "as o#e ce#tral "ub ost

ore co puters a#d t"e ability to #etwork pri#ters. ,"is type

ca# be used for s all busi#esses a#d e+e# "o e #etworks. ,"e star #etwork is +ery useful for applicatio#s w"ere so e processi#' perfor ed locally. ,"e ust be ce#trali6ed a#d so e ust be

a&or disad+a#ta'e is t"e star #etwork is its +ul#erability. $ll 5

data

ust pass t"rou'" o#e ce#tral "ost co puter a#d if t"at "ost fails t"e e#tire #etwork

will fail. 1# t"e ot"er "a#d t"e bus #etwork "as #o ce#tral co puter a#d all co puters are li#ked o# a si#'le circuit. ,"is type broadcasts si'#als i# all directio#s a#d it uses special software to ide#tify w"ic" co puter 'ets w"at si'#al. 1#e disad+a#ta'e wit" t"is type of #etwork is t"at o#ly o#e si'#al ca# be se#t at o#e ti e% if two si'#als are se#t at t"e sa e ti e t"ey will collide a#d t"e si'#al will fail to reac" its desti#atio#. 1#e ad+a#ta'e is t"at t"ere is #o ce#tral co puter so if o#e co puter 'oes dow# ot"ers will #ot be affected a#d will be able to se#d o#e a#ot"er. 0>audo#2 ,"e t"ird type of #etwork is t"e ri#' #etwork. Si ilar to t"e bus #etwork% t"e ri#' #etwork does #ot rely o# a ce#tral "ost co puter eit"er. 3ac" co puter i# t"e #etwork ca# co u#icate directly wit" a#y essa'es to

ot"er co puter% a#d eac" processes its ow# applicatio#s i#depe#de#tly. $ ri#' #etwork for s a closed loop a#d data is se#t i# o#e directio# o#ly a#d if a co puter i# t"e #etwork fails t"e data is still able to be tra#s itted. ,ypically t"e ra#'e of a wired #etwork is wit"i# a 2%0004foot4radius. ,"e disad+a#ta'e of t"is is t"at data tra#s issio# o+er t"is dista#ce ay be slow or

#o#e8iste#t. ,"e be#efit of a wired #etwork is t"at ba#dwidt" is +ery "i'" a#d t"at i#terfere#ce is +ery li ited t"rou'" direct co##ectio#s. Wired #etworks are a#d ca# be used i# ore secure

a#y situatio#s7 corporate >$Ns% sc"ool #etworks a#d "ospitals. ,"e ust be rewired e+ery ti e it is o+ed.

bi''est drawback to t"is type of #etwork is t"at it 0>audo#2

Wireless Networks @

$ wireless #etwork% w"ic" uses "i'"4fre5ue#cy radio wa+es rat"er t"a# wires to co u#icate betwee# #odes% is a#ot"er optio# for "o e or busi#ess #etworki#'.

I#di+iduals a#d or'a#i6atio#s ca# use t"is optio# to e8pa#d t"eir e8isti#' wired #etwork or to 'o co pletely wireless. Wireless allows for de+ices to be s"ared wit"out #etworki#' cable w"ic" i#creases obility but decreases ra#'e. ,"ere are two ai#

types of wireless #etworki#'7 peer to peer or ad4"oc a#d i#frastructure. 0Wi4fi.co 2 $# ad4"oc or peer4to4peer wireless #etwork co#sists of a #u ber of co puters eac" e5uipped wit" a wireless #etworki#' i#terface card. 3ac" co puter ca# co u#icate directly wit" all of t"e ot"er wireless

e#abled co puters. ,"ey ca# s"are files a#d pri#ters t"is way% but ay #ot be able to access wired >$N resources% u#less o#e of t"e co puters acts as a brid'e to t"e wired >$N usi#' special software. $# i#frastructure wireless #etwork co#sists of a# access poi#t or a base statio#. I# t"is type of #etwork t"e access poi#t acts like a "ub% pro+idi#' co##ecti+ity for t"e wireless co puters. It ca# co##ect or brid'e t"e wireless >$N to a wired >$N% allowi#' wireless co puter access to >$N resources% suc" as file ser+ers or e8isti#' I#ter#et )o##ecti+ity. 0co p#etworki#'.about.co 2 ,"ere are four basic types of tra#s issio#s sta#dards for wireless #etworki#'. ,"ese types are produced by t"e I#stitute of 3lectrical a#d 3lectro#ic 3#'i#eers 0I3332. ,"ese sta#dards defi#e all aspects of radio fre5ue#cy wireless #etworki#'. ,"ey "a+e establis"ed four tra#s issio# sta#dards7 A02.??% A02.??a% A02.??b% A02.??'. ,"e basic differe#ces betwee# t"ese four types are co##ectio# speed a#d radio fre5ue#cy. A02.?? a#d A02.??b are t"e slowest at ? or 2 Mbps a#d 5.5 a#d ??Mbps respecti+ely. ,"ey bot" operate off of t"e 2.= G(6 radio fre5ue#cy. A02.??a operates off of a 5 G(6 fre5ue#cy a#d ca# tra#s it up to 5= Mbps a#d t"e A02.??' operates off of t"e 2.= G(6 fre5ue#cy a#d ca# tra#s it up to 5= Mbps. $ctual tra#s issio# speeds +ary B

depe#di#' o# suc" factors as t"e #u ber a#d si6e of t"e p"ysical barriers wit"i# t"e #etwork a#d a#y i#terfere#ce i# t"e radio tra#s issio#s. 0Wi4fi.co 2 Wireless #etworks are reliable% but w"e# i#terfered wit" it ca# reduce t"e ra#'e a#d t"e 5uality of t"e si'#al. I#terfere#ce ca# be caused by ot"er de+ices operati#' o# t"e sa e radio fre5ue#cy a#d it is +ery "ard to co#trol t"e additio# of #ew de+ices o# t"e sa e fre5ue#cy. Csually if your wireless ra#'e is co pro ised co#siderably% likely% i#terfere#ce is to bla e. 0>audo#2 $ a&or cause of i#terfere#ce wit" a#y radio si'#als are t"e aterials i# your ore t"a#

surrou#di#'s% especially

etallic substa#ces% w"ic" "a+e a te#de#cy to reflect radio etal arou#d a "o e are #u erous44

si'#als. Needless to say% t"e pote#tial sources of t"i#'s like

etal studs% #ails% buildi#' i#sulatio# wit" a foil backi#' a#d e+e# lead pai#t

ca# all possibly reduce t"e 5uality of t"e wireless radio si'#al. Materials wit" a "i'" de#sity% like co#crete% te#d to be "arder for radio si'#als to pe#etrate% absorbi#' ore of

t"e e#er'y. 1t"er de+ices utili6i#' t"e sa e fre5ue#cy ca# also result i# i#terfere#ce wit" your wireless. For e8a ple% t"e 2.=G(6 fre5ue#cy used by A02.??b4based wireless products to co u#icate wit" eac" ot"er. Wireless de+ices do#<t "a+e t"is fre5ue#cy all

to t"e sel+es. I# a busi#ess e#+iro# e#t% ot"er de+ices t"at use t"e 2.=G(6 ba#d i#clude icrowa+e o+e#s a#d certai# cordless p"o#es. 0>au#do#2 1# t"e ot"er "a#d% usi#' a#y wireless #etworks ca# i#crease t"e ra#'e of t"e si'#al by

a#y differe#t types of "ardware de+ices. $ wireless e8te#der ca# be used to relay o#e poi#t to a#ot"er wit"out losi#' si'#al stre#'t". 3+e# t"ou'"

t"e radio fre5ue#cy fro

t"is de+ice e8te#ds t"e ra#'e of a wireless si'#al it "as so e drawbacks. 1#e drawback is t"at it e8te#ds t"e si'#al% but t"e tra#s issio# speed will be slowed. ,"ere are a#y be#efits to a wireless #etwork. ,"e ost i porta#t o#e is t"e

optio# to e8pa#d your curre#t wired #etwork to ot"er areas of your or'a#i6atio# w"ere it would ot"erwise #ot be cost effecti+e or practical to do so. $# or'a#i6atio# ca# also i#stall a wireless #etwork wit"out p"ysically disrupti#' t"e curre#t workplace or wired A

#etwork. 0Wi4Fi.or'2 Wireless #etworks are far easier to

o+e t"a# a wired #etwork a#d

addi#' users to a# e8isti#' wireless #etwork is easy. 1r'a#i6atio#s opt for a wireless #etwork i# co#fere#ce roo s% lobbies a#d offices w"ere addi#' to t"e e8isti#' wired #etwork ay be too e8pe#si+e to do so.

Wired vs. Wireless Networking ,"e bi''est differe#ce betwee# t"ese two types of #etworks is o#e uses #etwork cables a#d o#e uses radio fre5ue#cies. $ wired #etwork allows for a faster a#d ore

secure co##ectio# a#d ca# o#ly be used for dista#ces s"orter t"a# 2%000 feet. $ wireless #etwork is a lot less secure a#d tra#s issio# speeds ca# suffer fro $lt"ou'" wireless #etworki#' is a lot ore outside i#terfere#ce.

obile t"a# wired #etworki#' t"e ra#'e of

t"e #etwork is usually ?504:00 i#doors a#d up to ?000 feet outdoors depe#di#' o# t"e terrai#. 0(o ela#e8trea .co 2 ,"e cost for wired #etworki#' "as beco e rat"er i#e8pe#si+e. 3t"er#et cables% "ubs a#d switc"es are +ery i#e8pe#si+e. So e co##ectio# s"ari#' software packa'es% like I)S% are free7 so e cost a #o i#al fee. -roadba#d routers cost ore% but t"ese are

optio#al co po#e#ts of a wired #etwork% a#d t"eir "i'"er cost is offset by t"e be#efit of easier i#stallatio# a#d built4i# security features. Wireless 'ear costs so ew"at ore t"a# t"e e5ui+ale#t wired 3t"er#et products. ay cost t"ree or four ti es as

$t full retail prices% wireless adapters a#d access poi#ts

uc" as 3t"er#et cable adapters a#d "ubs;switc"es% respecti+ely. A02.??b products "a+e dropped i# price co#siderably wit" t"e release of A02.??'. 0(o ela#e8trea .co 2 Wired >$Ns offer superior perfor a#ce. $ traditio#al 3t"er#et co##ectio# offers o#ly ?0 Mbps ba#dwidt"% but ?00 Mbps Fast 3t"er#et tec"#olo'y costs a little ore a#d

is readily a+ailable. Fast 3t"er#et s"ould be sufficie#t for file s"ari#'% 'a i#'% a#d "i'"4 speed I#ter#et access for a#y years i#to t"e future. 0Wi4Fi.or'2 Wired >$Ns utili6i#'

"ubs ca# suffer perfor a#ce slowdow# if co puters "ea+ily utili6e t"e #etwork D

si ulta#eously. Cse 3t"er#et switc"es i#stead of "ubs to a+oid t"is proble 7 a switc" costs little ore t"a# a "ub. a8i u ba#dwidt" of ?? Mbps%

Wireless #etworks usi#' A02.??b support a

rou'"ly t"e sa e as t"at of old% traditio#al 3t"er#et. A02.??a a#d A02.??' >$Ns support 5= Mbps% t"at is appro8i ately o#e4"alf t"e ba#dwidt" of Fast 3t"er#et. Furt"er ore% wireless #etworki#' perfor a#ce is dista#ce se#siti+e% perfor a#ce will de'rade o# co puters fart"er away fro co u#icatio# e#dpoi#t. $s ea#i#' t"at a8i u

t"e access poi#t or ot"er ore "ea+ily%

ore wireless de+ices utili6e t"e A02.?? >$N

perfor a#ce de'rades e+e# furt"er. 0Wi4Fi.or'2 ,"e 'reater obility of wireless >$Ns "elps offset t"e perfor a#ce disad+a#ta'e. freely wit"i# odels% a#d

Mobile co puters do #ot #eed to be tied to a# 3t"er#et cable a#d ca# roa t"e wireless #etwork ra#'e. (owe+er% e+e# obile co puters a#y co puters are lar'er desktop

ust so eti es be tied to a# electrical cord a#d outlet for power. a#y or'a#i6atio#s a#d

,"is u#der i#es t"e "o es.

obility ad+a#ta'e of wireless #etworks i#

For a#y wired #etwork co##ected to t"e I#ter#et% firewalls are t"e pri ary security co#sideratio#. Wired 3t"er#et "ubs a#d switc"es do #ot support firewalls. (owe+er% firewall software products like Eo#e $lar ca# be i#stalled o# t"e co puters

t"e sel+es. -roadba#d routers offer e5ui+ale#t firewall capability built i#to t"e de+ice% co#fi'urable t"rou'" its ow# software. I# t"eory% wireless >$Ns are less secure t"a# wired >$Ns% because wireless co u#icatio# si'#als tra+el t"rou'" t"e air a#d ca# easily be i#tercepted. ,"e ore t"eoretical t"a# practical. 0Wi4Fi.or'2 Wireless

weak#esses of wireless security are

#etworks protect t"eir data t"rou'" t"e Wired 35ui+ale#t Pri+acy 0W3P2 e#cryptio# sta#dard t"at akes wireless co u#icatio#s reaso#ably as safe as wired o#es.

No co puter #etwork is co pletely secure. I porta#t security co#sideratio#s for or'a#i6atio#s te#d to #ot be related to w"et"er t"e #etwork is wired or wireless but rat"er ?0

e#suri#' t"at t"e firewall is properly co#fi'ured% e ployees are aware of t"e da#'ers of spoof e ails% t"ey are away of spy ware a#d "ow to a+oid a#d t"at a#yo#e outside t"e or'a#i6atio# does #ot "a+e u#aut"ori6ed access to t"e #etwork.

Wireless Network Security Network security is a bi' co#cer# for i#di+iduals a#d or'a#i6atio#s because +ital i#for atio# is stored o# t"e #etwork a#d ost critical process of t"e busi#ess are do#e

t"rou'" t"e #etwork. If a #etwork is to fail or security is co pro ised a# or'a#i6atio# could be co pletely crippled. For e8a ple% if Wal4Mart was to lose t"eir cas" re'ister #etwork t"a# t"ey would suffer a "u'e loss of busi#ess a#d would take% depe#di#' o# t"e se+erity of t"e breac"% se+eral "ours to days to fi8. $lso at risk is e ployee a#d clie#t pri+acy. If a# or'a#i6atio#9s #etwork is "acked i#to t"ey would "a+e access to clie#t databases as well as e ployee databases. ,"e ost i porta#t t"i#' to keep i# i#d w"e# it co es to wireless #etwork security is

keepi#' u#aut"ori6ed users fro

accessi#' your #etwork. ,"e first step is to k#ow your

wireless #etwork9s ra#'e a#d to use specific software to 'ra#t access o#ly to aut"ori6ed users.

Trojan Horse I#truders use se+eral differe#t ways of 'ai#i#' access to your #etwork. So e of t"e ost co o# o#es are ,ro&a# "orses% de#ial of ser+ice% e4 ail spoofi#'% e4 ail bor#e t"at appears le'iti ate% but

+iruses a#d packet s#iffi#'. $ ,ro&a# "orse is a pro'ra perfor s so e illicit acti+ity w"e# it is ru#. It i#for atio# or ake t"e syste

ay be used to locate password

ore +ul#erable to future e#try or si ply destroy

pro'ra s or data o# t"e "ard disk. $ ,ro&a# "orse is si ilar to a +irus% e8cept t"at it does #ot replicate itself. It stays i# t"e co puter doi#' its da a'e or allowi#' so ebody fro

??

a re ote site to take co#trol of t"e co puter. ,ro&a#s ofte# s#eak i# attac"ed to a free 'a e or ot"er utility.

enial o! Service " oS# $#ot"er co o# et"od of i#trusio# is de#ial of ser+ice 0DoS2. $ DoS is a type

of attack o# a #etwork t"at is desi'#ed to bri#' t"e #etwork to its k#ees by floodi#' it wit" useless traffic. De#ial of Ser+ice attacks is ter ed o#e of t"e worst attacks a#d is #e8t to i possible to track. So e t"i#'s t"at ca# be do#e to reduce t"e risk of bei#' stu#' by a de#ial of ser+ice attack i#cludeF 0wi#dowsecurity.co 2 Not ru##i#' your ser+ers at a le+el too close to capacity. Csi#' packet filteri#'. Geepi#' up4to4date o# security4related patc"es.

$%mail &orne 'iruses 3 ail4bor#e +iruses are a#ot"er atte pt people will use to 'ai# e#try or cripple your #etwork. 3 ail4bor#e +iruses are +iruses a#d attac" e#t to a# e4 ail. ,"e alicious code t"at is se#t as a#

ost i porta#t t"i#' to re e ber is #ot to ope# a#y

attac" e#ts wit"out k#owi#' t"e source. Most ti es e+e# k#owi#' t"e source is#9t as safe. For e8a ple% t"e Melissa .irus was spread by se#di#' to people i# your ow# address book. It spread 5uickly because people were 'etti#' e ails fro people t"ey

k#ew a#d trusted. 0-lack-o8.co 2 Ways to a+oid e4 ail bor#e +iruses is toF Ne+er ru# a pro'ra u#less you k#ow it to be aut"ored by a perso#

or co pa#y your trust.

?2

Do#9t se#d pro'ra s to your frie#ds si ply because t"ey are a usi#' H t"ey code. ay co#tai# e4 ail bor#e +iruses or alicious

(acket Sni!!ing $ packet s#iffer is a pro'ra tra+el o+er t"e #etwork. ,"at data t"at captures data fro i#for atio# packets as t"ey

ay i#clude user #a es a#d passwords t"at tra+el o+er

t"e #etwork i# clear te8t. Wit" per"aps "u#dreds or t"ousa#ds of passwords captured by t"e packet s#iffer% i#truders ca# lau#c" widespread attacks o# syste s. I#stalli#' a packet s#iffer does #ot #ecessarily re5uire ad i#istrator4le+el access. 0wi#dowssecurity.co 2 )able ode users "a+e a "i'"er risk of e8posure to packet s#iffers si#ce e#tire ode users are effecti+ely part of t"e sa e #etwork. $ packet ode user<s co puter i# a #ei'"bor"ood ode ay be able to

#ei'"bor"oods of cable

s#iffer i#stalled o# a#y cable

capture data tra#s itted by a#y ot"er cable

i# t"e sa e #ei'"bor"ood. ,"is sa e

co#cept applies to a#yo#e w"o is atte pti#' to access your wireless #etwork wit"out per issio#. If t"ey "a+e t"ese types of files i#stalled o# t"eir co puter it is 'oi#' to affect your #etwork. ost likely

(reventative )et*ods I#di+iduals a#d or'a#i6atio#s ca# take pre+e#tati+e et"ods to a+oid i#trusio#s.

1r'a#i6atio#s first step is to protect t"eir +aluable i#for atio#. ,"eir first li#e of defe#se is a firewall. $ firewall is a #u ber of security sc"e es t"at pre+e#ts u#aut"ori6ed users fro 'ai#i#' access to a co puter #etwork or a firewall could be used to a #etwork. o#itor

tra#sfers of i#for atio# to a#d fro

Firewalls co e i# a wide +ariety of for s. *outers co e co plete wit" a built4i# firewall a#d ca# be used for "o e #etworki#'. Se+eral co pa#ies ake ore powerful% ?:

e8ter#al firewalls w"ic" ca# be used wit" corporate #etworks. Firewalls are +ery effecti+e at pre+e#ti#' attacks a#d t"e cost for a firewall is defi#itely offset by t"e be#efit a#d security it pro+ides.

$ncryption 1r'a#i6atio#s ca# use e#cryptio# to tra#sfor data i#to a "ard to i#terpret for .

,"is allows busi#esses to tra#s it data o+er t"eir #etworks i# a secure way a#d e+e# if a perso# were to i#tercept t"e data t"ey would#9t be able to i#terpret a#yway. )o pa#ies will use e#cryptio# to protect co#fide#tiality% i#te'rity a#d aut"e#ticity. 1#e busi#ess t"at uses e#cryptio# is (I* -lock. ,"ere are ti es w"e# a custo er9s i#co e ta8 retur# ust be sa+ed to a diskette for tra#sfer or edit purposes. ,"ese files are e#crypted a#d ca# o#ly be i#terpreted by (I* -lock software. 0fou#dsto#e.co 2

Anti%virus So!tware $# a#ti4+irus pro'ra is a utility t"at searc"es a "ard disk for +iruses a#d

re o+es a#y t"at are fou#d. Most a#ti+irus pro'ra s i#clude a# auto4update feature t"at e#ables t"e pro'ra to dow#load profiles of #ew +iruses so t"at it ca# c"eck for t"e #ew

+iruses as soo# as t"ey are disco+ered. 38a ples of t"is type of software are Norto# $#ti4+irus% Mc$fee $#ti4+irus a#d $.G +irus protectio#. 0wi#dowssecurity.co 2 $#ti4+irus software is a# esse#tial utility for or'a#i6atio#s to "a+e to pre+e#t +iruses fro i#fecti#' t"eir #etwork. )urre#t a#ti4+irus pro'ra s "a+e o#4de a#d file ea#s t"at e+ery ti e you access a file it is sca##ed for a +irus. I "a+e ost efficie#t at

sca##i#' w"ic" tested

a#y a#ti4+irus utilities a#d "a+e fou#d t"e $.G a#ti4+irus is t"e

'etti#' t"e &ob do#e. ,"is utility is free for i#di+iduals a#d a reaso#able cost for or'a#i6atio#s.

Anti%Spyware Applications ?=

,o u#dersta#d spyware applicatio#s you

ust first u#dersta#d w"at spyware is.

Spyware co#sists of co puter software t"at 'at"ers a#d reports i#for atio# about a co puter user wit"out t"e user<s k#owled'e or co#se#t. $ #etwork ca# be i#filtrated wit" spyware w"e# a# e ployee +isits a website usi#' t"e #etwork9s i#ter#et co##ectio#. Spyware ca# 'o u#detected or ca# be +ery bot"erso e to t"e user. Most ofte# ti es t"eir will be pop4up ads% u#wa#ted pro'ra s a#d "u'e decrease i# perfor a#ce. 0I#ter"ack.#et2 Spyware "as beco e +ery popular a#d a#y applicatio#s "a+e bee# created to sca#s ost i porta#tly t"e #etwork will suffer a

pre+e#t suc" co puter abuse. 1#e e8a ple is >a+asoft9s $d$ware. ,"is pro'ra your co puter9s "ard dri+e for spyware a#d deletes t"e effecti+e pro'ra fro

t"e syste . ,"is is a +ery is +ery si ilar but

alo#' wit" Spybot Searc" I Destroy. ,"is pro'ra

offers a real ti e protectio# utility t"at ca# fi#d a#d delete spyware o# de a#d. 0I#ter"ack.co 2

Conclusion Wired a#d Wireless #etworks are +ery co o# i# t"e workplace as well as i# t"e

"o e. ,ec"#olo'y "as bee# created to store% tra#s it a#d recei+e data t"rou'" #etworks at +ery "i'" rates of speed. Networks "a+e beco e esse#tial to co pleti#' daily busi#ess tasks a#d ost busi#ess% t"ose w"o rely "ea+ily o# i#for atio# tec"#olo'ies%

would be crippled wit"out t"eir #etworks. $d+a#ces i# #etworki#' stora'e "a+e allowed for or'a#i6atio#s to use t"eir #etworks #ot o#ly for t"e s"ari#' of resources but to store lar'e pools of data to be used for data a#alysis. )o pa#ies ca# #ow store detailed profile i#for atio# for custo ers at a +ery low cost. I# t"e future% t"e speed of #etworks will i#crease as t"ey "a+e i# past years. ,"e cost of #etworks will co#ti#ue to decli#e a#d usi#' a #etwork will be esse#tial for e+ery or'a#i6atio#. $s co puti#' tec"#olo'y i#creases i# power% a#d decreases i# si6e% t"e price of creati#' a "i'"4powered full featured #etwork will decrease rapidly. ?5

?@

Works Cited

"ttpF;;www."o ela#8tre e.co ;wired4+s4wireless."t "ttpF;;www.+ico soft.co ;k#owled'e;refere#ce;wireless?."t lJ@ "ttpF;;www.cert.or';tec"Ktips;"o eK#etworks."t lJi#troductio# "ttpF;;www.pcstats.co ;article+iew.cf /articleIDL?=AD "ttpF;;co p#etworki#'.about.co ;od;wirelesssecurity; "ttpF;;www. icrosoft.co ;"ardware;broadba#d#etworki#';?0Kco#ceptKw"atKisKwireless . sp8 "ttpF;;www.i#fotel4syste s.co ;wirelessM20#etworki#'M20outli#e."t "ttpF;;www."o e#et"elp.co ;web;dia'ra ;i#de8.asp "ttpF;;www.wi#dowsecurity.co ;articles;Wireless4Networks4Surpassed4Security4Wired4 Networks."t l "ttpF;;w"atis.tec"tar'et.co ;defi#itio#s)ate'ory;0%2ADD?5%sidDKta8?@A?%00."t l "ttpF;;www.wi4fi.or';1pe#Sectio#;wirelessK+sKwired.asp/,IDL2 "ttpF;;www.wi4fipla#et.co ;tutorials;article.p"p;?=D=2=? "ttpF;;www.blackbo8.co ;tec"Kdocs;tec"Ko+er+iews;wiredwireless."t l "ttpF;;www.desi'#s"are.co ;*esearc";Wired;Wired2."t

?B

Você também pode gostar