Seminor Report Presented by T.Lokesh Reddy 114C1A04B1 Ece-B Wireless Technology
Seminor Report Presented by T.Lokesh Reddy 114C1A04B1 Ece-B Wireless Technology
Seminor Report Presented by T.Lokesh Reddy 114C1A04B1 Ece-B Wireless Technology
In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free wireless connections in places like coffee shops and airports. If youre using wireless technology, or considering making the move to wireless, you should know about the security threats you may encounter. This paper highlights those threats, and explains what you need to know to use wireless safely, both in the home and in public. You will find definitions of underlined terms in the glossary at the end of this paper.
Piggybacking
If you fail to secure your wireless network, anyone with a wireless-enabled computer within range of your wireless access point can hop a free ride on the internet over your wireless connection. The typical indoor broadcast range of an access point is 150 300 feet. Outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or condominium, failure to secure your wireless network could potentially open your internet connection to a surprising number of users. Doing so invites a number of problems:
. Service violations: You may exceed the number of connections permitted by your internet service provider. . Bandwidth shortages: Users piggybacking on your internet connection might use up your bandwidth and slow your connection. . . Abuse by malicious users: Users piggybacking on your internet connection might engage in illegal activity that will be traced to you. . Monitoring of your activity: Malicious users may be able to monitor your internet activity and steal passwords and other sensitive information. Direct attack on your computer: Malicious users may be able to access files on your computer, install spyware and other malicious programs, or take control of your computer.
wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections possible outside your home, even as far away as your street. Savvy computer users know this, and some have made a hobby out of driving through cities and neighborhoods with a wireless-equipped computersometimes with a powerful antennasearching for unsecured wireless networks. This practice is nicknamed wardriving. Wardrivers often note the location of unsecured wireless networks and publish this information on web sites. Malicious individuals wardrive to find a connection they can use to perpetrate illegal online activity using your connection to mask their identities. They may also directly attack your computer, as noted in the Piggybacking section above.
Unauthorized Computer
An unsecured wireless network combined with unsecured file sharing can spell disaster. Under these conditions, a malicious user could access any directories and files you have allowed forsharing.
While the security problems associated with wireless networking are serious, there are steps you can take to protect yourself. The following sections describe these steps.