Signal encryption comes in several flavors which range from disgusting, to nominally edible. WEP
Our second choice is WPA encryption. It provides much better authentication that WEP putting it in the range of a good deli sandwich. Encryptions offered are TKIP(deli sandwich with non-head cheese), and AES-CCMP(deli sandwich wish avocado and all the extra junk). AES-CCMP is the standard for 802.11i and WPA2. The problem with WPA becomes your implementation. WPA Enterprise offers RADIUS authentication providing each connection with personal authentication. WPA Personal, on the other hand, relies on a passphrase to gain access. Problem being that there is only one passphrase coming in

I have overcome all of the deficiencies of encryption by employing a direct, psychological fear-based defense method. When a wardriver is attempting to scour wireless networks that may be harboring curried chutney or a really great pesto, you have to focus your defenses on a different level. What would be a potential downfall of connecting to an unknown wireless network not controlled by yourself? You guessed it(or not) a virus!!
The most effective form of wireless security has to be to change your SSID to something unsavory for anyone looking to get onto it. Start security right at the gates of your fortress. Who in there right mind would attempt to join a network called 'Virus', or 'Trojan Horse'? Better yet, shoot straight for their physical self. Name your network 'AIDS' or 'West Nile Virus'. That ought to deter just about anyone except the CDC, and then you might have a court battle with the feds if one of them really does catch something.

As proof of concept for my contribution to the field of wireless security, the college where I work has several student teams in the field of Construction Management who are attending a friendly cage-match competition against other colleges. At the several day slaughter fest of project scheduling and brutal array of speeches, the teams will need personal wireless networks to coordinate and spearhead attacks against their foes. My idea has been picked up as the leading security model of one of these teams and they will bring glory to our college with a vast arsenal of wireless security techniques.
No comments:
Post a Comment