From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Configuring security in wireless networks

Configuring security in wireless networks - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Configuring security in wireless networks

- [Instructor] Early wireless networks didn't employ encryption and were known as open networks, however, this meant that anyone could attach to the network, which had some significant risks. The first and most obvious is that this leads to additional local network traffic, and also potentially consumption of internet bandwidth and data allowance. A malicious attacker can use an open network as a launching point for attacks on other systems, so ensuring that any traceback and blame stops at the network they've accessed. Even more maliciously, however, being on the local network allows an attacker to use techniques such as app spoofing to attack network clients directly with exploits and through man-in-the-middle attacks. Security was first deployed on wireless systems in the form of the Wired Equivalent Privacy, or WEP. This was integrated into the 802.11b standard and was designed to protect wireless networks to the same…

Contents