Cisco Systems WMA11B manual Passive Attacks, Jamming Attacks

Page 45

Wireless-B Media Adapter

But even WEP has its problems. WEP’s encryption algorithm is referred to as “simple”, which also means “weak”, because the technology that scrambles the wireless signal isn’t too hard to crack for a persistent hacker.

There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as:

1.Passive Attacks

2.Jamming Attacks

3.Active Attacks

4.Dictionary-building or Table Attacks

5.Man-in-the-Middle Attacks

Passive Attacks

There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily available on the Internet that can allow a person to listen into your wireless network and the information it broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message conversations, emails, account information, and any data transmitted wirelessly, can easily be seen by someone outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a “packet sniffer”, software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security.

Jamming Attacks

Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave ovens can create a great deal of interference and jam transmissions on your wireless network. One way to resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information transmissions.

Appendix B: Wireless Security

38

What Are The Risks?

Image 45
Contents 802 GHz .11b Wireless- B Copyright and Trademarks How to Use this GuideTable of Contents Appendix C Planning Your Use of the Wireless-B Media Adapter List of Figures For SetupUnplug the Power Figure E-1 XP Default Interface Welcome IntroductionWhat’s in this Guide? Wireless-B Media Adapter Back Panel Power Ssid your wireless network’s name Remote Controller Overview Connection to a Wired Network for SetupConnect the Power Running the Setup Wizard Setting up the Wireless-B Media AdapterWindows Installer Screen License Agreement Screen Connection for Setup Screen 10 Connection after Setup Screen 12 Basic Wireless Settings Screen 13 Wireless Security Settings Screen Using the Utility’s Icon in Your PC’s System Tray Using the Adapter UtilityMedia Folder Manager Using the Start MenuInstructions Move the Adapter and its power adapter to the TVConnecting to Your TV and Stereo Connecting the Adapter to Your Network Connecting to Your TV OnlyVertical Position Placement OptionsInstalling the Adapter Utility Using the TV Setup10 Microsoft .NET Framework Package Screen 12 Select Music and Pictures Folders Screen Setting up the Adapter from Your TV14 Media Adapter Setup Music Menus Using the Media NavigatorAll Songs Choose MusicHow to Play Music Now PlayingMusic Options Pictures Menu Choose PicturesNow Showing Picture Options How to Start a Slideshow with Music12 Help Screen HelpCommon Problems and Solutions Appendix a TroubleshootingPicture won’t change on the TV What types of picture files can I show with the Adapter? Frequently Asked QuestionsWhat types of playlist files can I use with the Adapter? Can I play music from a CD using the Adapter? Appendix B Wireless Security Brief OverviewWhat Are The Risks? Jamming Attacks Passive AttacksActive Attacks Maximizing Wireless SecurityDictionary-Building or Table Attacks Man-in-the-Middle AttacksWireless-B Media Adapter Ssid Wireless-B Media Adapter WEP Encryption Using the Adapter as Part of Your Wired Network Using the Adapter as Part of Your Wireless NetworkAppendix D Creating a Playlist Figure E-1 XP Default Interface Appendix E Setting a Static IP Address on Your PCFigure E-5 IP Address Click the OK button again to exit Appendix F Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix G Glossary Wireless-B Media Adapter Wireless-B Media Adapter Wireless-B Media Adapter Wireless-B Media Adapter Wireless-B Media Adapter Standards Ieee 802.11b, Ieee 802.3, Ieee 802.3u Ports Appendix H SpecificationsOperating Temp Power External, 5V DC, 2.0 a CertificationsStorage Temp Operating HumidityLimited Warranty Appendix I Warranty InformationFCC Statement Appendix J Regulatory InformationIndustry Canada Canada Wireless-B Media Adapter Chapter K Contact Information