--Originally published at Software engineering
Security is one of the most important issues when talking about wireless networks. Since the birth of these, has tried to have protocols to ensure communications, but have suffered little success. For this reason, it is convenient to carefully follow a series of steps that allow us to have the maximum degree of security that we are capable of ensuring.
There are many techniques to protect a wireless network being the first of them to provide a method of authentication to the network.
Authentication and encryption
WEP only provides a weak form of authentication and does not encrypt traffic on the wireless network. Then there are other stronger methods of authentication and, in addition, provide encryption for the exchanged packets. We can mention in this section two technologies: WPA and WPA2.
Another one is to use a VPN:
VPN is an acronym for Virtual Private Network. The purpose of a VPN is to provide you with security and privacy as you communicate over the internet.
Here’s the problem with the internet: It’s inherently insecure. When the internet was first designed, the priority was to be able to send packets (chunks of data) as reliably as possible. Networking across the country and the world was relatively new, and nodes often went down. Most of the internet’s core protocols (methods of communicating) were designed to route around failure, rather than secure data.
In fact, the applications you’re accustomed to using, whether email, web, messaging, Facebook, etc., are all built on top of that Internet Protocol (IP) core. While some standards have developed, not all internet apps are secure. Many still send their information without any security or privacy protection whatsoever.
This leaves any internet user vulnerable to criminals who might steal your banking or credit card information, governments who might Continue reading "Network and Wireless Security" →